
From nobody Thu Sep  1 00:31:37 2016
Return-Path: <fcoras.lists@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F55112D786 for <lisp@ietfa.amsl.com>; Thu,  1 Sep 2016 00:31:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id plZPD7xLEgJR for <lisp@ietfa.amsl.com>; Thu,  1 Sep 2016 00:31:32 -0700 (PDT)
Received: from mail-wm0-x229.google.com (mail-wm0-x229.google.com [IPv6:2a00:1450:400c:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F2D512D181 for <lisp@ietf.org>; Thu,  1 Sep 2016 00:31:32 -0700 (PDT)
Received: by mail-wm0-x229.google.com with SMTP id w2so62092289wmd.0 for <lisp@ietf.org>; Thu, 01 Sep 2016 00:31:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:mime-version:from:in-reply-to:date:cc:message-id:references :to; bh=VcCHdpK6N5ChSgK6pTOG6pCj/c82yEwur8JrLuv3kYQ=; b=TIlxPbdXCm0hDS0kP2RH1weSBatXb+khINTAjDkC6Xaik2DnzbZIiLnDwmBZ3b2vMu SifW9kr9FR+LtafNJV4ilTUbDxKkFKI0vv2UDxkWiZ609Ojcr6eGUSDbXpzMf3Bc7FHH /AlY1nocbpNewnTWKYkmkyBYNFCgKwfly2bX2aaooGnaec3gikc2sl37ekZ+DHw7XTyq cnVHHex5icuk8tO7nEc0kdLMLxT0BorOj9Q9jsdvkxCUYegpQpuakrSqcDo6jBQKFO/K WSWIqQGPQOQ3OuFtt6QUKmoCurAYJy0zmioHBOuKMh+1de3HqBJzJXGhJiX0yUs1stja Vsdg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:mime-version:from:in-reply-to:date:cc :message-id:references:to; bh=VcCHdpK6N5ChSgK6pTOG6pCj/c82yEwur8JrLuv3kYQ=; b=egOi3f1Y2WcQQkglP22Tj9YW1Y9wQ516iv4tH9NERTbhKzS812P4dnObMA8So+xFA3 YS86vpX4vy1UgIpt/+ynbl9Ng90h/2lSJbWVQVzNKzyueK3Q5zgTv8hoT8g37disXGZu iIikuwQHqNEbOnX9HZwpOUYG5ULIjUukyON+xrN2RzFbxg2cskxNq7WanYlnZq78UyDs JO1s3n9kxYd+K+2g0eWapQL3Df+yPA1XwZht9MklrbfGgtq0DTT8ngT7iZFVVEJZQ4Cl Zj2dIpkYSGhd5viHm5BYz+kFKUEvCxlF2SOFrKNtl4UKTuoOXfBixC58uLgLH3Nuad+B gTuQ==
X-Gm-Message-State: AE9vXwOzqQSCpZoYBN7SPaxTuxsshRES2esWNW3RXHjsZXj9EmCygN62TxojtWazASo4gw==
X-Received: by 10.195.13.18 with SMTP id eu18mr12767091wjd.121.1472715090573;  Thu, 01 Sep 2016 00:31:30 -0700 (PDT)
Received: from [192.168.1.107] ([90.74.25.36]) by smtp.gmail.com with ESMTPSA id cw7sm3709650wjb.38.2016.09.01.00.31.29 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 01 Sep 2016 00:31:29 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
Content-Type: multipart/alternative; boundary="Apple-Mail=_941E65C4-9A5A-4EF6-914B-E1E798F81160"
From: Florin Coras <fcoras.lists@gmail.com>
In-Reply-To: <94c95e23-b2d8-ced7-64e4-7f00bb13c834@cisco.com>
Date: Thu, 1 Sep 2016 09:31:28 +0200
Message-Id: <9A9492B9-8BD3-4A9D-B00B-C2B8EBD62D22@gmail.com>
References: <983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net> <94c95e23-b2d8-ced7-64e4-7f00bb13c834@cisco.com>
To: Fabio Maino <fmaino@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/uzySCi6GxJJohrRc-LHiEsriQCo>
Cc: lisp@ietf.org
Subject: Re: [lisp] WG Last Call for draft-ietf-lisp-type-iana-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2016 07:31:35 -0000

--Apple-Mail=_941E65C4-9A5A-4EF6-914B-E1E798F81160
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

+1

Florin

> On Sep 1, 2016, at 2:45 AM, Fabio Maino <fmaino@cisco.com> wrote:
>=20
> I support moving this document forward.=20
>=20
> Fabio
>=20
> On 8/17/16 1:58 PM, Luigi Iannone wrote:
>> Hi All,
>>=20
>> The authors of the LISP Experimental Message & IANA Registry for LISP =
Packet=20
>> Type Allocations =
[https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00 =
<https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00>] asked for WG =
Last Call.=20
>>=20
>> This email starts the usual two weeks WG Last Call, to end August =
31st, 2016.
>>=20
>> Please review this WG document and let the WG know if you agree that =
it is ready for handing to the AD.
>> If you have objections, please state your reasons why, and explain =
what it would take to address your concerns.
>>=20
>> Thanks
>>=20
>> Luigi & Joel
>>=20
>>=20
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org <mailto:lisp@ietf.org>
>> https://www.ietf.org/mailman/listinfo/lisp =
<https://www.ietf.org/mailman/listinfo/lisp>
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


--Apple-Mail=_941E65C4-9A5A-4EF6-914B-E1E798F81160
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">+1<div class=""><br class=""></div><div class="">Florin</div><div class=""><br class=""><div><blockquote type="cite" class=""><div class="">On Sep 1, 2016, at 2:45 AM, Fabio Maino &lt;<a href="mailto:fmaino@cisco.com" class="">fmaino@cisco.com</a>&gt; wrote:</div><br class="Apple-interchange-newline"><div class="">
  
    <meta content="text/html; charset=windows-1252" http-equiv="Content-Type" class="">
  
  <div bgcolor="#FFFFFF" text="#000000" class="">
    <div class="moz-cite-prefix">I support moving this document forward.
      <br class="">
      <br class="">
      Fabio<br class="">
      <br class="">
      On 8/17/16 1:58 PM, Luigi Iannone wrote:<br class="">
    </div>
    <blockquote cite="mid:983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net" type="cite" class="">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252" class="">
      Hi All,<br class="">
      <div class="">
        <div class="" style="word-wrap: break-word; -webkit-nbsp-mode:
          space; -webkit-line-break: after-white-space;">
          <div class=""><br class="">
          </div>
          <div class="">The authors of the LISP Experimental Message
            &amp; IANA Registry for LISP Packet&nbsp;</div>
          <div class="">Type Allocations [<a moz-do-not-send="true" href="https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00" class="">https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00</a>]
            asked for WG Last Call.&nbsp;</div>
          <div class=""><br class="">
          </div>
          <div class="">This email starts the usual two weeks WG Last
            Call, to end August 31st, 2016.</div>
          <div class="">
            <div class=""><br class="">
            </div>
            <div class="">Please review this WG document and let the WG
              know if you agree that it is ready for handing to the AD.</div>
          </div>
          <div class="">If you have objections, please state your
            reasons why, and explain what it would take to address your
            concerns.</div>
          <div class=""><font class="" color="#00afcd"><br class="">
            </font>
            <div class="">Thanks</div>
          </div>
          <div class=""><font class="" color="#00afcd"><br class="">
            </font>Luigi &amp; Joel</div>
        </div>
      </div>
      <br class="">
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br class="">
      <pre wrap="" class="">_______________________________________________
lisp mailing list
<a class="moz-txt-link-abbreviated" href="mailto:lisp@ietf.org">lisp@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/lisp">https://www.ietf.org/mailman/listinfo/lisp</a>
</pre>
    </blockquote><p class=""><br class="">
    </p>
  </div>

_______________________________________________<br class="">lisp mailing list<br class=""><a href="mailto:lisp@ietf.org" class="">lisp@ietf.org</a><br class="">https://www.ietf.org/mailman/listinfo/lisp<br class=""></div></blockquote></div><br class=""></div></body></html>
--Apple-Mail=_941E65C4-9A5A-4EF6-914B-E1E798F81160--


From nobody Thu Sep  1 12:49:05 2016
Return-Path: <yueli.cnfr@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD74912D6B2 for <lisp@ietfa.amsl.com>; Thu,  1 Sep 2016 12:49:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JSEpsmyyY60E for <lisp@ietfa.amsl.com>; Thu,  1 Sep 2016 12:49:02 -0700 (PDT)
Received: from mail-oi0-x22a.google.com (mail-oi0-x22a.google.com [IPv6:2607:f8b0:4003:c06::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E19E612D5FF for <lisp@ietf.org>; Thu,  1 Sep 2016 12:49:01 -0700 (PDT)
Received: by mail-oi0-x22a.google.com with SMTP id c15so132367618oig.0 for <lisp@ietf.org>; Thu, 01 Sep 2016 12:49:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to;  bh=MPLqQGQGTS+waxKrcVGW/8cPhUsJPo0tORKCY2jqM3A=; b=ZSlV+SFFFeKks6K2z3WLNQLaOP3IbpR7LXgbgwZeB4wnCsfvPmmsQOq8d02ikbOKjV eyjqn4+ZHtrHJ/vg9x65EG3H8dSTQjzJX54MpbTRIVSFEBL7iKOm+hmNH8pyn8W1KSqw b3j30v1Z+ruB7wm3fIqAt6AtEeoakmcXV5OOFhhL7CMOByp/VWRtskCt+SC1RphvOp/V 2SEdNLUhG0Bd4JWg6Px3H/euKyvIX3rriMbIX3lVIj9x6kewJfn8306rpHzZTOsqgrNy t+m1gf/orVJVtJ57ZDQuxJizZI9DU4Nce5MZXkv3WvGHnqnWrcfywQrcDVhp8EiQNMnl fJtw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=MPLqQGQGTS+waxKrcVGW/8cPhUsJPo0tORKCY2jqM3A=; b=WorhK0PRegiiJgTMRVjiXPLPtEWOjfkl5zDWhsLMFDhrQZCIVJhaxep7QaIdVQs74Z qahWWLkpLAo7vCC5hYkYaS9OA7FVzW4JbM5hiZe3qUaCZYqkkt8oKloVh+7edbwtb81C hmYWzhmeK82pXkCBj23SdiklrzMr5wRqur1bJuzI+wNhHfNXw2B4d848KSMSXgyW7jbG TAumbF1n7+76pN5lR7IxASEiI2Tnh/bHXQZTbpbR/ch5rdwqwY/2hEB94NO5sxIa/pLO zzM7TappF4c4p7LLz2v/Ym76KBsMdHZb+KE+/6CcDBO9i4SJWlIpCp9Jfin9X5n6ACLy B8Zg==
X-Gm-Message-State: AE9vXwOm13O5Oz5JICUl/bMWD6W0XtDYf4Hv8D4HvwJ5n+j1ZQu9SQ0KJnVTzUTvTgj4+o/Bx7y2z9CutfBMTQ==
X-Received: by 10.202.53.132 with SMTP id c126mr15291371oia.3.1472759341149; Thu, 01 Sep 2016 12:49:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.202.76.214 with HTTP; Thu, 1 Sep 2016 12:49:00 -0700 (PDT)
In-Reply-To: <9A9492B9-8BD3-4A9D-B00B-C2B8EBD62D22@gmail.com>
References: <983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net> <94c95e23-b2d8-ced7-64e4-7f00bb13c834@cisco.com> <9A9492B9-8BD3-4A9D-B00B-C2B8EBD62D22@gmail.com>
From: Yue LI <yueli.cnfr@gmail.com>
Date: Thu, 1 Sep 2016 21:49:00 +0200
Message-ID: <CAASoLj2HMgBwQA8Xwz4T7qeiMg95svnecrTDJRT-JDLJCBdr6A@mail.gmail.com>
To: LISP mailing list list <lisp@ietf.org>
Content-Type: multipart/alternative; boundary=001a113cf3e65e773a053b778194
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/r9xnj8JZVGI7pKNGFVj2HHfXzQQ>
Subject: Re: [lisp] WG Last Call for draft-ietf-lisp-type-iana-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2016 19:49:04 -0000

--001a113cf3e65e773a053b778194
Content-Type: text/plain; charset=UTF-8

Dear all,

I also support.

Yue

On Thu, Sep 1, 2016 at 9:31 AM, Florin Coras <fcoras.lists@gmail.com> wrote:

> +1
>
> Florin
>
> On Sep 1, 2016, at 2:45 AM, Fabio Maino <fmaino@cisco.com> wrote:
>
> I support moving this document forward.
>
> Fabio
>
> On 8/17/16 1:58 PM, Luigi Iannone wrote:
>
> Hi All,
>
> The authors of the LISP Experimental Message & IANA Registry for LISP
> Packet
> Type Allocations [https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00]
> asked for WG Last Call.
>
> This email starts the usual two weeks WG Last Call, to end August 31st,
> 2016.
>
> Please review this WG document and let the WG know if you agree that it is
> ready for handing to the AD.
> If you have objections, please state your reasons why, and explain what it
> would take to address your concerns.
>
> Thanks
>
> Luigi & Joel
>
>
> _______________________________________________
> lisp mailing listlisp@ietf.orghttps://www.ietf.org/mailman/listinfo/lisp
>
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>
>
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>
>


-- 
Yue LI
PhD student, Telecom ParisTech
Tel: +33 (0)661091840
E-mail: yueli.cnfr@gmail.com

--001a113cf3e65e773a053b778194
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear all,<div><br></div><div>I also support.</div><div><br=
></div><div>Yue</div><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Thu, Sep 1, 2016 at 9:31 AM, Florin Coras <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:fcoras.lists@gmail.com" target=3D"_blank">fcoras.lists@gmail.=
com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"w=
ord-wrap:break-word">+1<span class=3D"HOEnZb"><font color=3D"#888888"><div>=
<br></div><div>Florin</div></font></span><div><div class=3D"h5"><div><br><d=
iv><blockquote type=3D"cite"><div>On Sep 1, 2016, at 2:45 AM, Fabio Maino &=
lt;<a href=3D"mailto:fmaino@cisco.com" target=3D"_blank">fmaino@cisco.com</=
a>&gt; wrote:</div><br><div>
 =20
   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    <div>I support moving this document forward.
      <br>
      <br>
      Fabio<br>
      <br>
      On 8/17/16 1:58 PM, Luigi Iannone wrote:<br>
    </div>
    <blockquote type=3D"cite">
     =20
      Hi All,<br>
      <div>
        <div style=3D"word-wrap:break-word">
          <div><br>
          </div>
          <div>The authors of the LISP Experimental Message
            &amp; IANA Registry for LISP Packet=C2=A0</div>
          <div>Type Allocations [<a href=3D"https://tools.ietf.org/html/dra=
ft-ietf-lisp-type-iana-00" target=3D"_blank">https://tools.ietf.org/html/<w=
br>draft-ietf-lisp-type-iana-00</a>]
            asked for WG Last Call.=C2=A0</div>
          <div><br>
          </div>
          <div>This email starts the usual two weeks WG Last
            Call, to end August 31st, 2016.</div>
          <div>
            <div><br>
            </div>
            <div>Please review this WG document and let the WG
              know if you agree that it is ready for handing to the AD.</di=
v>
          </div>
          <div>If you have objections, please state your
            reasons why, and explain what it would take to address your
            concerns.</div>
          <div><font color=3D"#00afcd"><br>
            </font>
            <div>Thanks</div>
          </div>
          <div><font color=3D"#00afcd"><br>
            </font>Luigi &amp; Joel</div>
        </div>
      </div>
      <br>
      <fieldset></fieldset>
      <br>
      <pre>______________________________<wbr>_________________
lisp mailing list
<a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/lisp</a>
</pre>
    </blockquote><p><br>
    </p>
  </div>

______________________________<wbr>_________________<br>lisp mailing list<b=
r><a href=3D"mailto:lisp@ietf.org" target=3D"_blank">lisp@ietf.org</a><br><=
a href=3D"https://www.ietf.org/mailman/listinfo/lisp" target=3D"_blank">htt=
ps://www.ietf.org/mailman/<wbr>listinfo/lisp</a><br></div></blockquote></di=
v><br></div></div></div></div><br>______________________________<wbr>______=
___________<br>
lisp mailing list<br>
<a href=3D"mailto:lisp@ietf.org">lisp@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/lisp</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div cla=
ss=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr">=
Yue LI<div>PhD student, Telecom ParisTech<br><div>Tel: +33 (0)661091840</di=
v><div>E-mail: <a href=3D"mailto:yueli.cnfr@gmail.com" target=3D"_blank">yu=
eli.cnfr@gmail.com</a></div></div></div></div>
</div></div>

--001a113cf3e65e773a053b778194--


From nobody Thu Sep  1 15:35:44 2016
Return-Path: <rodrigueznatal@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EB8912D96A; Thu,  1 Sep 2016 15:35:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HFM_HNxOe1Yn; Thu,  1 Sep 2016 15:35:40 -0700 (PDT)
Received: from mail-oi0-x22d.google.com (mail-oi0-x22d.google.com [IPv6:2607:f8b0:4003:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD17A12D7AE; Thu,  1 Sep 2016 15:35:40 -0700 (PDT)
Received: by mail-oi0-x22d.google.com with SMTP id p186so102688813oia.2; Thu, 01 Sep 2016 15:35:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=RJh+NAUXiwTaXMk6/qG2jrGd9+IBCZhjPYRG+WZSyJI=; b=ReWnDJdg2/N3azBz4wN40es41YRIxfrpDlVTYMvyPHNaatmiSIOkYR/S0SCWtvhAOI +nekzBwX5t80H73jGYaBu2SZpIYUaTCYkrlnidfFz1SXUXpahiXdapi8xRfi3r/Dla1A CY5a/gZdzLAwbBGpCTk119i+SwrFRtFxYyiCT/q7SmZjoEiZZRDt8p+AS/9R0GWZjYm/ XilzzdmFdYO/YNlOpLJ2ASsgiQnZKHSVuaNIpd4JekyVD21Rs+A/AW2w2DQzhcAiUCBw lugMhH5bwV0StGgaIrQicapzVIBax5Iz65P2jf9ixfvLg8eadlrySiqw3mNBdmxX3L79 cCLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=RJh+NAUXiwTaXMk6/qG2jrGd9+IBCZhjPYRG+WZSyJI=; b=jxatU6qq5KDaMZPaZzFFtGMKLf4j/soA7m4QEQfPWYddstElJpL5B6Dat/5VpUT+pu UXXv+Yg+7e8aoxjsc2bZPC4F5lwQcDCfy0+iG271lCveWnoxdEZ3IFutB+KNftaljizH 3Rn9KCORvoAQy0nQmVE/5BAO+B9OHpevhpWWEb/xqnWjxhb7h4GiR+LI9d5M8GDZK0fl VxfBlZ0GPv6egc/sjXGFSvGDI5nvgVA3Wpcqwq9JsGE2Coe+cessbqzvjFA/2jzfRFYb 2ZSyc7R0ieX6yFerlNhsY+MbR/DoSadTL/SLecZzNAF2/cH+J/JWyyyzFrqMqHFnBKNK XI5Q==
X-Gm-Message-State: AE9vXwOFgZ2llJzJ+zM2hoL2xreRSzD6giMQZnxZkANqPKhVML5yaZ/kTE7f3DTF4JgmMWRz7LD6uZaSjjyfzg==
X-Received: by 10.202.237.4 with SMTP id l4mr11509387oih.21.1472769339874; Thu, 01 Sep 2016 15:35:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.199.102 with HTTP; Thu, 1 Sep 2016 15:35:19 -0700 (PDT)
In-Reply-To: <BE423FAC-0D32-4B68-B297-F5A5BA318172@gigix.net>
References: <983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net> <BE423FAC-0D32-4B68-B297-F5A5BA318172@gigix.net>
From: Alberto Rodriguez-Natal <rodrigueznatal@gmail.com>
Date: Thu, 1 Sep 2016 15:35:19 -0700
Message-ID: <CA+YHcKEtQFVPH8a17covNrrxDXqsqHKtB1VyHRzyVfpnHACing@mail.gmail.com>
To: Luigi Iannone <ggx@gigix.net>
Content-Type: multipart/alternative; boundary=001a113d22dc56e5a5053b79d5cf
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/JWJweRvxL2LhlRuCTRigehAEllI>
Cc: lisp-chairs@ietf.org, LISP mailing list list <lisp@ietf.org>
Subject: Re: [lisp] WG Last Call for draft-ietf-lisp-type-iana-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2016 22:35:42 -0000

--001a113d22dc56e5a5053b79d5cf
Content-Type: text/plain; charset=UTF-8

+1

Alberto

On Tue, Aug 30, 2016 at 3:09 AM, Luigi Iannone <ggx@gigix.net> wrote:

> Folks,
>
> This call will close soon, please express your opinion on whether this
> document is ready or not for the IESG.
>
> Silence is not consensus.
>
> ciao
>
> L.
>
>
> On 17 Aug 2016, at 22:58, Luigi Iannone <ggx@gigix.net> wrote:
>
> Hi All,
>
> The authors of the LISP Experimental Message & IANA Registry for LISP
> Packet
> Type Allocations [https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00]
> asked for WG Last Call.
>
> This email starts the usual two weeks WG Last Call, to end August 31st,
> 2016.
>
> Please review this WG document and let the WG know if you agree that it is
> ready for handing to the AD.
> If you have objections, please state your reasons why, and explain what it
> would take to address your concerns.
>
> Thanks
>
> Luigi & Joel
>
>
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>
>

--001a113d22dc56e5a5053b79d5cf
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>+1<br><br></div>Alberto<br></div><div class=3D"gmail_=
extra"><br><div class=3D"gmail_quote">On Tue, Aug 30, 2016 at 3:09 AM, Luig=
i Iannone <span dir=3D"ltr">&lt;<a href=3D"mailto:ggx@gigix.net" target=3D"=
_blank">ggx@gigix.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x"><div style=3D"word-wrap:break-word">Folks,<br><div><br></div><div>This c=
all will close soon, please express your opinion on whether this document i=
s ready or not for the IESG.</div><div><br></div><div>Silence is not consen=
sus.</div><div><br></div><div>ciao</div><span class=3D"HOEnZb"><font color=
=3D"#888888"><div><br></div><div>L.</div></font></span><div><div class=3D"h=
5"><div><br></div><div><br><div><blockquote type=3D"cite"><div>On 17 Aug 20=
16, at 22:58, Luigi Iannone &lt;<a href=3D"mailto:ggx@gigix.net" target=3D"=
_blank">ggx@gigix.net</a>&gt; wrote:</div><br><div><div style=3D"word-wrap:=
break-word">Hi All,<br><div><div style=3D"word-wrap:break-word"><div><br></=
div><div>The authors of the LISP Experimental Message &amp; IANA Registry f=
or LISP Packet=C2=A0</div><div>Type Allocations [<a href=3D"https://tools.i=
etf.org/html/draft-ietf-lisp-type-iana-00" target=3D"_blank">https://tools.=
ietf.org/html/<wbr>draft-ietf-lisp-type-iana-00</a>] asked for WG Last Call=
.=C2=A0</div><div><br></div><div>This email starts the usual two weeks WG L=
ast Call, to end August 31st, 2016.</div><div><div><br></div><div>Please re=
view this WG document and let the WG know if you agree that it is ready for=
 handing to the AD.</div></div><div>If you have objections, please state yo=
ur reasons why, and explain what it would take to address your concerns.</d=
iv><div><font color=3D"#00afcd"><br></font><div>Thanks</div></div><div><fon=
t color=3D"#00afcd"><br></font>Luigi &amp; Joel</div></div></div></div></di=
v></blockquote></div><br></div></div></div></div><br>______________________=
________<wbr>_________________<br>
lisp mailing list<br>
<a href=3D"mailto:lisp@ietf.org">lisp@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/lisp" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/lisp</a><br>
<br></blockquote></div><br></div>

--001a113d22dc56e5a5053b79d5cf--


From nobody Fri Sep  2 00:48:48 2016
Return-Path: <stefano.secci@lip6.fr>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30AEF12D162 for <lisp@ietfa.amsl.com>; Fri,  2 Sep 2016 00:48:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Level: 
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.548, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5f1HFHcKmf-e for <lisp@ietfa.amsl.com>; Fri,  2 Sep 2016 00:48:41 -0700 (PDT)
Received: from osiris.lip6.fr (osiris.lip6.fr [132.227.60.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3553A12D0DB for <lisp@ietf.org>; Fri,  2 Sep 2016 00:48:40 -0700 (PDT)
Received: from tibre.lip6.fr (tibre.lip6.fr [132.227.74.2]) by osiris.lip6.fr (8.15.2/lip6) with ESMTP id u827mbqB027104 for <lisp@ietf.org>; Fri, 2 Sep 2016 09:48:37 +0200 (CEST)
X-pt: osiris.lip6.fr
Received: from [192.168.1.40] (bre75-4-78-194-65-24.fbxo.proxad.net [78.194.65.24]) (authenticated bits=0) by tibre.lip6.fr (8.15.1/8.14.7) with ESMTPSA id u827mb8b014395 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <lisp@ietf.org>; Fri, 2 Sep 2016 09:48:37 +0200 (MEST)
Content-Type: multipart/signed; boundary="Apple-Mail=_43E33332-4F83-4464-B000-884A2E95C235"; protocol="application/pgp-signature"; micalg=pgp-sha256
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Pgp-Agent: GPGMail
From: Stefano Secci <stefano.secci@lip6.fr>
In-Reply-To: <mailman.11.1472756403.9900.lisp@ietf.org>
Date: Fri, 2 Sep 2016 09:48:37 +0200
Message-Id: <C740A7B7-EB18-41F9-A3F7-825BEE607230@lip6.fr>
References: <mailman.11.1472756403.9900.lisp@ietf.org>
To: lisp@ietf.org
X-Mailer: Apple Mail (2.1993)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (osiris.lip6.fr [132.227.60.30]); Fri, 02 Sep 2016 09:48:37 +0200 (CEST)
X-Scanned-By: MIMEDefang 2.78 on 132.227.60.30
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/JNzpjQ8fbFyhusj5N788PhG_CkM>
Subject: Re: [lisp] WG Last Call for draft-ietf-lisp-type-iana-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Sep 2016 07:48:46 -0000

--Apple-Mail=_43E33332-4F83-4464-B000-884A2E95C235
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii

+1

Cheers,
Stefano

> On 8/17/16 1:58 PM, Luigi Iannone wrote:
>> Hi All,
>> 
>> The authors of the LISP Experimental Message & IANA Registry for LISP
>> Packet
>> Type Allocations
>> [https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00] asked for
>> WG Last Call.
>> 
>> This email starts the usual two weeks WG Last Call, to end August
>> 31st, 2016.
>> 
>> Please review this WG document and let the WG know if you agree that
>> it is ready for handing to the AD.
>> If you have objections, please state your reasons why, and explain
>> what it would take to address your concerns.
>> 
>> Thanks
>> 
>> Luigi & Joel

--
Stefano Secci
Associate Professor
Univ. Pierre et Marie Curie
LIP6 - Office 25-26/518 - BC 169
4 place Jussieu, 75005 Paris, France
Tel:  +33 (0) 1 4427 3678
http://www-phare.lip6.fr/~secci


--Apple-Mail=_43E33332-4F83-4464-B000-884A2E95C235
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
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=fkPc
-----END PGP SIGNATURE-----

--Apple-Mail=_43E33332-4F83-4464-B000-884A2E95C235--


From nobody Sat Sep  3 07:10:00 2016
Return-Path: <ggx@gigix.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 828EA12D142 for <lisp@ietfa.amsl.com>; Sat,  3 Sep 2016 07:09:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gigix-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xx379f09Xlcy for <lisp@ietfa.amsl.com>; Sat,  3 Sep 2016 07:09:57 -0700 (PDT)
Received: from mail-wm0-x231.google.com (mail-wm0-x231.google.com [IPv6:2a00:1450:400c:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 09DFB12B028 for <lisp@ietf.org>; Sat,  3 Sep 2016 07:09:57 -0700 (PDT)
Received: by mail-wm0-x231.google.com with SMTP id v143so16770677wmv.0 for <lisp@ietf.org>; Sat, 03 Sep 2016 07:09:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gigix-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=12EJx7MhJAzRhODMoWoU1z0obYhKLR8BdsFaqG3cnyM=; b=lVokhh96ejWSZ/lTRe5fapeOxZlf0/OaNEY8Tb53sx6JM+JKm60IR1THxGxk/0i8Dd KFB5lhDUaNnp0zb+MgQ7g6Ifnun+MLhk1TRTgYu96Qd8YQc4hskN7LUwOYZBGkUxFE02 NCNCy/q7bzP0iqpS7T6/k9Uu6mpJEyjSZbDVD2rPKUfAT9entIAamMjfj+bz5kQMe7aV 7Grl/TFCFJoE2VmhjcuKSeiDFvagKi86DoDUTuCr4gSgkLFzp7fqV4sAu/dl2HhAQ1NO wMX+3PA4d4EFlryKCbdVOF8yswicH6gjplPixwWAGG2F3KUSXj3bN83SNRmBkB1l8H8+ TFHQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=12EJx7MhJAzRhODMoWoU1z0obYhKLR8BdsFaqG3cnyM=; b=jbv3oWLJne35PJaqzCunC6amU/ooUKkdrsviPymVE68mYNhcBE8WJAmFhyT0Ur8SE1 oonED7yHwuVoJXmwAe5sSdUtYf+A32Wf8HAB/VOTTpMeKB6ha2CrmTyIbubC/XeZVzci YPDGnR15HqqrcPQGLzhZmK0BMVWP3+Mt2v6bG2OzK6ylknNFESpc4gDW3Mo/iaVVdoX2 aVGCld62cR1TUhEvPT+E87Ib2s77E02N578cKpwoPYtGvUws9WPAnGfLOnJaarAa40WL QjeLxZxETDpwEDIB2bbeC56qkCZ0Gny21uRtG8WJNnTxcSwslJz1kolUQXhbaK+er6+G +IKA==
X-Gm-Message-State: AE9vXwOcnQuOsvArpYTY4H73u4p0d0Avt0JO83WDg0ww94Ijo3sMR5xMf3uYf3ZiB4NHKg==
X-Received: by 10.28.13.143 with SMTP id 137mr8101388wmn.46.1472911795077; Sat, 03 Sep 2016 07:09:55 -0700 (PDT)
Received: from ?IPv6:2a01:e35:1381:3430:4d9:b556:6d1e:856e? ([2a01:e35:1381:3430:4d9:b556:6d1e:856e]) by smtp.gmail.com with ESMTPSA id p83sm8814181wma.18.2016.09.03.07.09.53 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sat, 03 Sep 2016 07:09:54 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_AD5F5BDD-3C93-4CA1-A633-5ADCED189038"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Luigi Iannone <ggx@gigix.net>
In-Reply-To: <983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net>
Date: Sat, 3 Sep 2016 16:09:53 +0200
Message-Id: <7DC808EF-B930-4BCF-8CCA-692A7D93CD8F@gigix.net>
References: <983495DD-BDFE-474C-90D1-F32DDE09D286@gigix.net>
To: LISP mailing list list <lisp@ietf.org>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/wZXvDkM7SwN031MbFeADJGhy_Z8>
Cc: lisp-chairs@ietf.org
Subject: Re: [lisp] WG Last Call for draft-ietf-lisp-type-iana-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Sep 2016 14:09:59 -0000

--Apple-Mail=_AD5F5BDD-3C93-4CA1-A633-5ADCED189038
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi All,

the WG LC for draft-ietf-lisp-iana-00 is now closed.

Several email were in favour of moving this document forward and no =
objections were raised.
It seems that there is consensus to request publication of this =
document.

The next step is having a shepherd. Any volunteer for this task?

Thanks

Luigi & Joel


> On 17 Aug 2016, at 22:58, Luigi Iannone <ggx@gigix.net> wrote:
>=20
> Hi All,
>=20
> The authors of the LISP Experimental Message & IANA Registry for LISP =
Packet=20
> Type Allocations =
[https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00 =
<https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00>] asked for WG =
Last Call.=20
>=20
> This email starts the usual two weeks WG Last Call, to end August =
31st, 2016.
>=20
> Please review this WG document and let the WG know if you agree that =
it is ready for handing to the AD.
> If you have objections, please state your reasons why, and explain =
what it would take to address your concerns.
>=20
> Thanks
>=20
> Luigi & Joel


--Apple-Mail=_AD5F5BDD-3C93-4CA1-A633-5ADCED189038
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">Hi All,<div class=3D""><br class=3D""></div><div class=3D"">the=
 WG LC for draft-ietf-lisp-iana-00 is now closed.</div><div class=3D""><br=
 class=3D""></div><div class=3D"">Several email were in favour of moving =
this document forward and no objections were raised.</div><div =
class=3D"">It seems that there is consensus to request publication of =
this document.</div><div class=3D""><br class=3D""></div><div =
class=3D"">The next step is having a shepherd. Any volunteer for this =
task?</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks</div><div class=3D""><br class=3D""></div><div =
class=3D"">Luigi &amp; Joel</div><div><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On 17 =
Aug 2016, at 22:58, Luigi Iannone &lt;<a href=3D"mailto:ggx@gigix.net" =
class=3D"">ggx@gigix.net</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html charset=3Dus-ascii" =
class=3D""><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space;" class=3D"">Hi All,<br =
class=3D""><div class=3D""><div class=3D"" style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;"><div class=3D""><br class=3D""></div><div =
class=3D"">The authors of the LISP Experimental Message &amp; IANA =
Registry for LISP Packet&nbsp;</div><div class=3D"">Type Allocations [<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00" =
class=3D"">https://tools.ietf.org/html/draft-ietf-lisp-type-iana-00</a>] =
asked for WG Last Call.&nbsp;</div><div class=3D""><br =
class=3D""></div><div class=3D"">This email starts the usual two weeks =
WG Last Call, to end August 31st, 2016.</div><div class=3D""><div =
class=3D""><br class=3D""></div><div class=3D"">Please review this WG =
document and let the WG know if you agree that it is ready for handing =
to the AD.</div></div><div class=3D"">If you have objections, please =
state your reasons why, and explain what it would take to address your =
concerns.</div><div class=3D""><font color=3D"#00afcd" class=3D""><br =
class=3D""></font><div class=3D"">Thanks</div></div><div class=3D""><font =
color=3D"#00afcd" class=3D""><br class=3D""></font>Luigi &amp; =
Joel</div></div></div></div></div></blockquote></div><br =
class=3D""></body></html>=

--Apple-Mail=_AD5F5BDD-3C93-4CA1-A633-5ADCED189038--


From nobody Mon Sep  5 00:10:31 2016
Return-Path: <jsaldana@unizar.es>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B07F12B0D1 for <lisp@ietfa.amsl.com>; Mon,  5 Sep 2016 00:10:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.829
X-Spam-Level: 
X-Spam-Status: No, score=-3.829 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.508, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MHBvTsfc0bGO for <lisp@ietfa.amsl.com>; Mon,  5 Sep 2016 00:10:27 -0700 (PDT)
Received: from huecha.unizar.es (huecha.unizar.es [155.210.1.51]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AA73128E18 for <lisp@ietf.org>; Mon,  5 Sep 2016 00:10:26 -0700 (PDT)
Received: from usuarioPC (gtc1pc12.cps.unizar.es [155.210.158.17]) (authenticated bits=0) by huecha.unizar.es (8.13.8/8.13.8/Debian-3) with ESMTP id u857ALJl013927; Mon, 5 Sep 2016 09:10:21 +0200
From: "Jose Saldana" <jsaldana@unizar.es>
To: <lisp@ietf.org>
Date: Mon, 5 Sep 2016 09:10:25 +0200
Message-ID: <005b01d20744$935a87c0$ba0f9740$@unizar.es>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_005C_01D20755.56E4DE60"
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQIr2ICXVE2JVEbYqIUOhZq/XStrbw==
Content-Language: es
X-Mail-Scanned: Criba 2.0 + Clamd & Bogofilter
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/-O0jUMicd3AP0thYMzqDLybzeeU>
Cc: =?iso-8859-1?Q?'Jos=E9_Ruiz_Mas'?= <jruiz@unizar.es>
Subject: [lisp] Next steps with the LISP multiplexing draft
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Sep 2016 07:10:30 -0000

This is a multipart message in MIME format.

------=_NextPart_000_005C_01D20755.56E4DE60
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi all,
=20
Regarding the multiplexing draft
(https://datatracker.ietf.org/doc/draft-saldana-lisp-compress-mux/), =
these
are the next steps we would consider:
=20
1) Signaling: How to signal that some traffic flows will be multiplexed. =
We
would use LCAF, as suggested by Dino in July:
=20
> You could also use the =93Encapsulation Format=94 LCAF type which =
tells the
ITR, on a
> lookup what the ETR is willing to accept. We COULD treat this new
capability as a
> different encapsulation type.
>=20
> Dino
=20
Our plan is to include this in the next version of the draft, and in the
implementation.
=20
=20
2) How to distinguish between a multiplexed and a non-multiplexed packet
(once the negotiation is finished).
=20
In the ETR we must be able to distinguish between a multiplexed and a
non-multiplexed packet. There would be two options for this:
=20
a) the use of a port number different from 4341 in the UDP header =
preceding
the LISP header.
b) something in the LISP header that flags the fact.
=20
We are currently using a) in the draft, and also in the implementation
(https://github.com/Simplemux/lispmob-with-simplemux), but perhaps b) =
could
be considered instead.
=20
=20
Any thoughts?
=20
Jose
PS: We have also received some feedback about an adaptive encapsulation
scheme that maximizes the number IP packets encapsulated into a single =
one
(see  <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=3D4151444>
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=3D4151444).
=20

------=_NextPart_000_005C_01D20755.56E4DE60
Content-Type: text/html;
	boundary="----=_NextPart_000_0158_01D20515.DD785A70";
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1"><meta name=3DProgId content=3DWord.Document><meta =
name=3DGenerator content=3D"Microsoft Word 15"><meta name=3DOriginator =
content=3D"Microsoft Word 15"><link rel=3DFile-List =
href=3D"cid:filelist.xml@01D20755.565AC6D0"><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:EnvelopeVis/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>ES</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:DoNotExpandShiftReturn/>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val=3D"Cambria Math"/>
<m:brkBin m:val=3D"before"/>
<m:brkBinSub m:val=3D"&#45;-"/>
<m:smallFrac m:val=3D"off"/>
<m:dispDef/>
<m:lMargin m:val=3D"0"/>
<m:rMargin m:val=3D"0"/>
<m:defJc m:val=3D"centerGroup"/>
<m:wrapIndent m:val=3D"1440"/>
<m:intLim m:val=3D"subSup"/>
<m:naryLim m:val=3D"undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState=3D"false" DefUnhideWhenUsed=3D"false" =
DefSemiHidden=3D"false" DefQFormat=3D"false" DefPriority=3D"99" =
LatentStyleCount=3D"371">
<w:LsdException Locked=3D"false" Priority=3D"0" QFormat=3D"true" =
Name=3D"Normal"/>
<w:LsdException Locked=3D"false" Priority=3D"9" QFormat=3D"true" =
Name=3D"heading 1"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 2"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 3"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 4"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 5"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 6"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 7"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 8"/>
<w:LsdException Locked=3D"false" Priority=3D"9" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"heading 9"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 6"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 7"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 8"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index 9"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 1"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 2"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 3"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 4"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 5"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 6"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 7"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 8"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toc 9"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Normal Indent"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"footnote text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"annotation text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"header"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"footer"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"index heading"/>
<w:LsdException Locked=3D"false" Priority=3D"35" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"caption"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"table of figures"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"envelope address"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"envelope return"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"footnote reference"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"annotation reference"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"line number"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"page number"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"endnote reference"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"endnote text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"table of authorities"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"macro"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"toa heading"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Bullet"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Number"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Bullet 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Bullet 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Bullet 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Bullet 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Number 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Number 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Number 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Number 5"/>
<w:LsdException Locked=3D"false" Priority=3D"10" QFormat=3D"true" =
Name=3D"Title"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Closing"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Signature"/>
<w:LsdException Locked=3D"false" Priority=3D"1" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Default Paragraph Font"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text Indent"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Continue"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Continue 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Continue 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Continue 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"List Continue 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Message Header"/>
<w:LsdException Locked=3D"false" Priority=3D"11" QFormat=3D"true" =
Name=3D"Subtitle"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Salutation"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Date"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text First Indent"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text First Indent 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Note Heading"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text Indent 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Body Text Indent 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Block Text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Hyperlink"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"FollowedHyperlink"/>
<w:LsdException Locked=3D"false" Priority=3D"22" QFormat=3D"true" =
Name=3D"Strong"/>
<w:LsdException Locked=3D"false" Priority=3D"20" QFormat=3D"true" =
Name=3D"Emphasis"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Document Map"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Plain Text"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"E-mail Signature"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Top of Form"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Bottom of Form"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Normal (Web)"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Acronym"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Address"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Cite"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Code"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Definition"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Keyboard"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Preformatted"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Sample"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Typewriter"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"HTML Variable"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Normal Table"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"annotation subject"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"No List"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Outline List 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Outline List 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Outline List 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Simple 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Simple 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Simple 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Classic 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Classic 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Classic 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Classic 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Colorful 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Colorful 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Colorful 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Columns 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Columns 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Columns 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Columns 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Columns 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 6"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 7"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Grid 8"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 4"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 5"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 6"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 7"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table List 8"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table 3D effects 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table 3D effects 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table 3D effects 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Contemporary"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Elegant"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Professional"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Subtle 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Subtle 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Web 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Web 2"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Web 3"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Balloon Text"/>
<w:LsdException Locked=3D"false" Priority=3D"39" Name=3D"Table Grid"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Table Theme"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" Name=3D"Placeholder =
Text"/>
<w:LsdException Locked=3D"false" Priority=3D"1" QFormat=3D"true" =
Name=3D"No Spacing"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light =
Shading"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List =
1"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List =
2"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid =
1"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid =
2"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid =
3"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful =
List"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful =
Grid"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 1"/>
<w:LsdException Locked=3D"false" SemiHidden=3D"true" Name=3D"Revision"/>
<w:LsdException Locked=3D"false" Priority=3D"34" QFormat=3D"true" =
Name=3D"List Paragraph"/>
<w:LsdException Locked=3D"false" Priority=3D"29" QFormat=3D"true" =
Name=3D"Quote"/>
<w:LsdException Locked=3D"false" Priority=3D"30" QFormat=3D"true" =
Name=3D"Intense Quote"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"60" Name=3D"Light Shading =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"61" Name=3D"Light List =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"62" Name=3D"Light Grid =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"63" Name=3D"Medium Shading =
1 Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"64" Name=3D"Medium Shading =
2 Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"65" Name=3D"Medium List 1 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"66" Name=3D"Medium List 2 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"67" Name=3D"Medium Grid 1 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"68" Name=3D"Medium Grid 2 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"69" Name=3D"Medium Grid 3 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"70" Name=3D"Dark List =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"71" Name=3D"Colorful =
Shading Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"72" Name=3D"Colorful List =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"73" Name=3D"Colorful Grid =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"19" QFormat=3D"true" =
Name=3D"Subtle Emphasis"/>
<w:LsdException Locked=3D"false" Priority=3D"21" QFormat=3D"true" =
Name=3D"Intense Emphasis"/>
<w:LsdException Locked=3D"false" Priority=3D"31" QFormat=3D"true" =
Name=3D"Subtle Reference"/>
<w:LsdException Locked=3D"false" Priority=3D"32" QFormat=3D"true" =
Name=3D"Intense Reference"/>
<w:LsdException Locked=3D"false" Priority=3D"33" QFormat=3D"true" =
Name=3D"Book Title"/>
<w:LsdException Locked=3D"false" Priority=3D"37" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" Name=3D"Bibliography"/>
<w:LsdException Locked=3D"false" Priority=3D"39" SemiHidden=3D"true" =
UnhideWhenUsed=3D"true" QFormat=3D"true" Name=3D"TOC Heading"/>
<w:LsdException Locked=3D"false" Priority=3D"41" Name=3D"Plain Table =
1"/>
<w:LsdException Locked=3D"false" Priority=3D"42" Name=3D"Plain Table =
2"/>
<w:LsdException Locked=3D"false" Priority=3D"43" Name=3D"Plain Table =
3"/>
<w:LsdException Locked=3D"false" Priority=3D"44" Name=3D"Plain Table =
4"/>
<w:LsdException Locked=3D"false" Priority=3D"45" Name=3D"Plain Table =
5"/>
<w:LsdException Locked=3D"false" Priority=3D"40" Name=3D"Grid Table =
Light"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"Grid Table 1 =
Light Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"Grid Table 2 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"Grid Table 3 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"Grid Table 4 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"Grid Table 5 =
Dark Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"Grid Table 6 =
Colorful Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"Grid Table 7 =
Colorful Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 1"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 2"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 3"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 4"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 5"/>
<w:LsdException Locked=3D"false" Priority=3D"46" Name=3D"List Table 1 =
Light Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"47" Name=3D"List Table 2 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"48" Name=3D"List Table 3 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"49" Name=3D"List Table 4 =
Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"50" Name=3D"List Table 5 =
Dark Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"51" Name=3D"List Table 6 =
Colorful Accent 6"/>
<w:LsdException Locked=3D"false" Priority=3D"52" Name=3D"List Table 7 =
Colorful Accent 6"/>
</w:LatentStyles>
</xml><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:1;
	mso-generic-font-family:roman;
	mso-font-format:other;
	mso-font-pitch:variable;
	mso-font-signature:0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1073786111 1 0 415 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-noshow:yes;
	mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-noshow:yes;
	mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;
	text-underline:single;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-link:"Texto sin formato Car";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Arial",sans-serif;
	mso-fareast-font-family:Calibri;
	color:#1F497D;
	mso-fareast-language:EN-US;}
span.TextosinformatoCar
	{mso-style-name:"Texto sin formato Car";
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-unhide:no;
	mso-style-locked:yes;
	mso-style-link:"Texto sin formato";
	font-family:"Arial",sans-serif;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:#1F497D;}
span.EstiloCorreo19
	{mso-style-type:personal-compose;
	mso-style-noshow:yes;
	mso-style-unhide:no;
	mso-ansi-font-size:11.0pt;
	mso-bidi-font-size:11.0pt;
	font-family:"Arial",sans-serif;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:#1F497D;
	mso-text-animation:none;
	font-weight:normal;
	font-style:normal;
	text-decoration:none;
	text-underline:none;
	text-decoration:none;
	text-line-through:none;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-size:10.0pt;
	mso-ansi-font-size:10.0pt;
	mso-bidi-font-size:10.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-fareast-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;
	mso-header-margin:36.0pt;
	mso-footer-margin:36.0pt;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 10]><style>/* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Tabla normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-hansi-font-family:Calibri;
	mso-fareast-language:EN-US;}
</style><![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DES =
link=3D"#0563C1" vlink=3D"#954F72" style=3D'tab-interval:35.4pt'><div =
class=3DWordSection1><p class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>Hi all,<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>Regarding the multiplexing draft (<a =
href=3D"https://datatracker.ietf.org/doc/draft-saldana-lisp-compress-mux/=
">https://datatracker.ietf.org/doc/draft-saldana-lisp-compress-mux/</a>),=
 these are the next steps we would consider:<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>1) Signaling: How to signal that some traffic flows will be =
multiplexed. We would use LCAF, as suggested by Dino in =
July:<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoPlainText><span =
lang=3DEN-US style=3D'mso-ansi-language:EN-US'>&gt; You could also use =
the &#8220;Encapsulation Format&#8221; LCAF type which tells the ITR, on =
a<o:p></o:p></span></p><p class=3DMsoPlainText><span lang=3DEN-US =
style=3D'mso-ansi-language:EN-US'>&gt; lookup what the ETR is willing to =
accept. We COULD treat this new capability as a<o:p></o:p></span></p><p =
class=3DMsoPlainText><span lang=3DEN-US =
style=3D'mso-ansi-language:EN-US'>&gt; different encapsulation =
type.<o:p></o:p></span></p><p class=3DMsoPlainText><span lang=3DEN-US =
style=3D'mso-ansi-language:EN-US'>&gt; <o:p></o:p></span></p><p =
class=3DMsoPlainText><span lang=3DEN-US =
style=3D'mso-ansi-language:EN-US'>&gt; Dino<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>Our plan is to include this in the next version of the draft, and =
in the implementation.<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>2) How to distinguish between a multiplexed and a non-multiplexed =
packet (once the negotiation is finished).<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>In the ETR we must be able to distinguish between a multiplexed =
and a non-multiplexed packet. There would be two options for =
this:<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>a) the use of a port number different from 4341 in the UDP header =
preceding the LISP header.<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>b) something in the LISP header that flags the =
fact.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>We are currently using a) in the draft, and also in the =
implementation (<a =
href=3D"https://github.com/Simplemux/lispmob-with-simplemux">https://gith=
ub.com/Simplemux/lispmob-with-simplemux</a>), but perhaps b) could be =
considered instead.<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'>Any thoughts?<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;color:#1F497D;mso-ansi-language:E=
N-US'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;mso-fareast-font-family:"Times =
New =
Roman";color:#1F497D;mso-ansi-language:EN-US;mso-fareast-language:ES;mso-=
no-proof:yes'>Jose<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;mso-fareast-font-family:"Times =
New =
Roman";color:#1F497D;mso-ansi-language:EN-US;mso-fareast-language:ES;mso-=
no-proof:yes'>PS: We have also received some feedback about an adaptive =
encapsulation scheme that maximizes the number IP packets encapsulated =
into a single one (see </span><a =
href=3D"http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=3D4151444"><=
span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;mso-fareast-font-family:"Times =
New =
Roman";mso-ansi-language:EN-US;mso-fareast-language:ES;mso-no-proof:yes'>=
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=3D4151444</span></a>=
<span lang=3DEN-US =
style=3D'font-family:"Arial",sans-serif;mso-fareast-font-family:"Times =
New =
Roman";color:#1F497D;mso-ansi-language:EN-US;mso-fareast-language:ES;mso-=
no-proof:yes'>).<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US =
style=3D'mso-ansi-language:EN-US'><o:p>&nbsp;</o:p></span></p></div></bod=
y></html>
------=_NextPart_000_005C_01D20755.56E4DE60--



From nobody Mon Sep  5 10:07:49 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6568012B2B1; Mon,  5 Sep 2016 10:07:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.298
X-Spam-Level: 
X-Spam-Status: No, score=-1.298 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_HTML_ATTACH=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f-L68f7KQ9IE; Mon,  5 Sep 2016 10:07:36 -0700 (PDT)
Received: from mail-pf0-x232.google.com (mail-pf0-x232.google.com [IPv6:2607:f8b0:400e:c00::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EC1C12B2FE; Mon,  5 Sep 2016 10:07:30 -0700 (PDT)
Received: by mail-pf0-x232.google.com with SMTP id g202so42964414pfb.0; Mon, 05 Sep 2016 10:07:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=R1LS+qBKS8JnkkzOPyftwOkpS6zUnoaIg88pscC9OFU=; b=zTr3q+Y67OIBKuOU3V6lCa1cwcCbd90JamduavUeYH5io7ZX2QDThx3itTzbXXzDgQ 4gET94J0oZ3v72iGurn8L4IGVn/pgLhT3W+RtYTmgK69f4RZPVNf5P+kTII6ao4ugd6t SUtD5LB+HbXZ4uyfwlGhNconkqMbAqX8RtB2tNdwK2sueadUwKPNBcmhnCFBg94KN6Gg e/7VqOKJNXG22hF0iUloPN1uarTeMnHoS41UoDBA7447hM16MPOOFTClbcJhMlu4bAvv keglRKIuCwOi5Z7M+aONPxcBQz7V5mU+uw2KP1BtBHsRQlexdWr2CNEz39U3iymvXnCT Jn9g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=R1LS+qBKS8JnkkzOPyftwOkpS6zUnoaIg88pscC9OFU=; b=OhQl3lInDGqlQeR2I46I14MOdApdoi8bbZ8hHRfM2cRWzJB8n2IIcubSwXANaJdmEm jNuVTfHzYVbGhyG5GdB8yFNT/9zWlFjf0nGdFr8AJma1UMZiWn9an+8tY+eI/h+p6WAq XxZXnXXhH1bGpLFtKLzNOGF2zjNN0PTw0NDse0cESZ0c9XtYNuoscqlkesYR4QD4W4Hp 8MCGYvNeo/HNGwleF9zdTzDy00se233CIK5Z0gLTN21pkgOjautMLUK6aG1Dv9WU+FAu gi0ubnPmJMVj1nEYT8rgWw8Ya42KQWc8he/SXwyg2MQ8sHmn7T18b1+LNHuxJu8xHLPa U1PQ==
X-Gm-Message-State: AE9vXwOT8Fc69z32ivav6+Q+/i81S++ZKCRO0YXw/9ECsbMaMZLRn1NEl3stpfFE0uaJ7g==
X-Received: by 10.98.59.145 with SMTP id w17mr14772507pfj.93.1473095249720; Mon, 05 Sep 2016 10:07:29 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id z187sm34818240pfz.39.2016.09.05.10.07.26 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 05 Sep 2016 10:07:27 -0700 (PDT)
Content-Type: multipart/mixed; boundary="Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <C11A93C3-6334-42B4-B5A7-065E8725C5E7@gigix.net>
Date: Mon, 5 Sep 2016 10:07:25 -0700
Message-Id: <B5D701A0-6D12-436B-8091-3802662556C1@gmail.com>
References: <9a0ab6afeff3fc8b86cc320a757ccbf8@tcb.net> <C11A93C3-6334-42B4-B5A7-065E8725C5E7@gigix.net>
To: Luigi Iannone <ggx@gigix.net>, Danny McPherson <danny@tcb.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/IEU9tddrknCy4PySMXp2nGL_Aog>
Cc: zhang.xian@huawei.com, LISP mailing list list <lisp@ietf.org>, Jonathan.Hardwick@metaswitch.com, draft-ietf-lisp-crypto.authors@ietf.org, Jon Hudson <jon.hudson@gmail.com>
Subject: Re: [lisp] RTG-DIR REVIEW: draft-ietf-lisp-crypto-06.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Sep 2016 17:07:46 -0000

--Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

See responses inline. A new draft is attached (but not submitted since I =
had some open questions).

>> Document: draft-ietf-lisp-crypto-06.txt
>>=20
>> Reviewer: Danny McPherson
>>=20
>> Review Date: August 24, 2016
>>=20
>> Intended Status: Experimental

Thanks for the review Danny.

>> Summary:
>>=20
>>  I have some minor concerns about this document that should be =
considered before publication.
>>=20
>> Comments:
>>=20
>> I believe the draft is technically sound.=20
>>=20
>> Major Issues:
>>=20
>> I have no =E2=80=9CMajor=E2=80=9D issues with this I-D.

Good to hear.

>> Minor Issues:
>>=20
>> In the Security Considerations section a small amount of text might =
be useful that discusses end-end v. encryption from middle boxes, and =
the risks therein.  There are clearly benefits to this over no =
encryption, but there are risks about assumptions that may be made =
thereafter as well.

I added some text. Please review.

>> Nits:
>>=20
>> S.1: s/typically not modified.  Which means/typically not modified, =
which means/

Changed.

>> S.1: Is there in fact a case where asymmetries result in the *same* =
egress xTRs but different keys are used?  I believe this would just =
apply to "different xTRs", no?  :

Right, when the same ETR is used by different ITRs to encapsulate =
traffic, different keys are used.

>>         However, return traffic uses the same procedures but with =
different key values by the same xTRs or potentially different xTRs when =
the paths between LISP sites are asymmetric.

Right, a unique set of keys are used for each {ITR, ETR} combination. =
Did you want me to say something specific here?

>> S.1: Regarding "[t]his document has the following requirements for =
the solutions space", it might be useful to reference some general IETF =
privacy work, even RFC 6973 or the like.  Given that it's Experimental I =
think it's fine as is, but some references for the broader community may =
be in order.  In particular, references to not requiring a separate PKI =
(and therefore external or circular dependencies!), avoiding third party =
trust anchor, rekeying as good operational practice, not just =
compromises,  and other such arguments might be reinforced.=20

I added a reference to 6973.

>> S.3: Could include LCAF here, perhaps.

Added plus its reference.

>> S.4: You could probably strike this entire sentence and lessen =
confusion: "When an ETR (when it is also an ITR) encapsulates packets to =
this ITR (when it is also an ETR), a separate key exchange and =
shared-secret computation is performed.=E2=80=9D

Okay, removed.

>> S.7: It=E2=80=99s unclear what constitutes =E2=80=9CDiffie-Hellman =
*group*=E2=80=9D.

I will change =E2=80=9Cgroup=E2=80=9D to =E2=80=9Cparameters=E2=80=9D.

>>=20
>> S.7: s/the the/the/
>>=20
>> S.7: s/integrity-check/integrity check/

Changed both.

>> S.8: Editors note to strike text in last paragraph here, unclear what =
resolution was from this text. =20

We allocated two new bits from a 3-bit reserved field now leaving 1 =
reserve bit. I added that the reserved bit remaining is documented in =
RFC6830.

>> S.12.1: A reference to the SAAG comments might be useful here?

We don=E2=80=99t have one. But I will add a list of recommendations they =
provided.

>> S 13: Are you sure you want a default FCFS allocation policy here and =
not a slightly higher bar?

I have no opinion. What is the benefit on not doing FCFS?

>> Throughout: Consistent hyphenation in the document would help (e.g., =
=E2=80=9Cnetwork-byte=E2=80=9D ..). =20

Done.

>> Throughout: Expanding on first use of each acronym would be useful, =
perhaps with references.

Done.

A new revision is attached (plus a htmlized diff file). Let me know if =
you like the text and then I=E2=80=99ll submit -07.

Thanks again,
Dino & Brian


--Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2
Content-Disposition: attachment;
	filename=rfcdiff.html
Content-Type: text/html;
	name="rfcdiff.html"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" =
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- saved from url=3D(0030)https://tools.ietf.org/rfcdiff -->
<html xmlns=3D"http://www.w3.org/1999/xhtml"><head><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=20
  =20
  <meta http-equiv=3D"Content-Style-Type" content=3D"text/css">=20
  <title>Diff: draft-ietf-lisp-crypto-06.txt - =
draft-ietf-lisp-crypto-07.txt</title>=20
  <style type=3D"text/css">=20
    body    { margin: 0.4ex; margin-right: auto; }=20
    tr      { }=20
    td      { white-space: pre; font-family: monospace; vertical-align: =
top; font-size: 0.86em;}=20
    th      { font-size: 0.86em; }=20
    .small  { font-size: 0.6em; font-style: italic; font-family: =
Verdana, Helvetica, sans-serif; }=20
    .left   { background-color: #EEE; }=20
    .right  { background-color: #FFF; }=20
    .diff   { background-color: #CCF; }=20
    .lblock { background-color: #BFB; }=20
    .rblock { background-color: #FF8; }=20
    .insert { background-color: #8FF; }=20
    .delete { background-color: #ACF; }=20
    .void   { background-color: #FFB; }=20
    .cont   { background-color: #EEE; }=20
    .linebr { background-color: #AAA; }=20
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; =
text-align: right; padding: 0 2px; }=20
    .elipsis{ background-color: #AAA; }=20
    .left .cont { background-color: #DDD; }=20
    .right .cont { background-color: #EEE; }=20
    .lblock .cont { background-color: #9D9; }=20
    .rblock .cont { background-color: #DD6; }=20
    .insert .cont { background-color: #0DD; }=20
    .delete .cont { background-color: #8AD; }=20
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px =
0; }=20
    span.hide { display: none; color: #aaa;}    a:hover span { display: =
inline; }    tr.change { background-color: gray; }=20
    tr.change a { text-decoration: none; color: black }=20
  </style>=20
     <script>
var chunk_index =3D 0;
var old_chunk =3D null;

function format_chunk(index) {
    var prefix =3D "diff";
    var str =3D index.toString();
    for (x=3D0; x<(4-str.length); ++x) {
        prefix+=3D'0';
    }
    return prefix + str;
}

function find_chunk(n){
    return document.querySelector('tr[id$=3D"' + n + '"]');
}

function change_chunk(offset) {
    var index =3D chunk_index + offset;
    var new_str;
    var new_chunk;

    new_str =3D format_chunk(index);
    new_chunk =3D find_chunk(new_str);
    if (!new_chunk) {
        return;
    }
    if (old_chunk) {
        old_chunk.style.outline =3D "";
    }
    old_chunk =3D new_chunk;
    old_chunk.style.outline =3D "1px solid red";
    window.location.hash =3D "#" + new_str;
    window.scrollBy(0,-100);
    chunk_index =3D index;
}

document.onkeydown =3D function(e) {
    switch (e.keyCode) {
    case 78:
        change_chunk(1);
        break;
    case 80:
        change_chunk(-1);
        break;
    }
};
   </script>=20
</head>=20
<body>=20
  <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">=20
  <tbody><tr id=3D"part-1" bgcolor=3D"orange"><th></th><th><a =
href=3D"https://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-lisp-crypto-06.tx=
t" style=3D"color:#008; text-decoration:none;">&lt;</a>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-crypto-06.txt" =
style=3D"color:#008">draft-ietf-lisp-crypto-06.txt</a>&nbsp;</th><th> =
</th><th>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-crypto-07.txt" =
style=3D"color:#008">draft-ietf-lisp-crypto-07.txt</a>&nbsp;<a =
href=3D"https://tools.ietf.org/rfcdiff?url1=3Ddraft-ietf-lisp-crypto-07.tx=
t" style=3D"color:#008; =
text-decoration:none;">&gt;</a></th><th></th></tr>=20
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Internet =
Engineering Task Force                             D. Farinacci</td><td> =
</td><td class=3D"right">Internet Engineering Task Force                 =
            D. Farinacci</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Internet-Draft    =
                                           lispers.net</td><td> </td><td =
class=3D"right">Internet-Draft                                           =
    lispers.net</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Intended status: =
Experimental                                    B. Weis</td><td> =
</td><td class=3D"right">Intended status: Experimental                   =
                 B. Weis</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0001"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">Expires: <span =
class=3D"delete">December 31, 2016</span>                                =
 cisco Systems</td><td> </td><td class=3D"rblock">Expires: <span =
class=3D"insert">March 9, 2017</span>                                    =
 cisco Systems</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
                                           <span class=3D"delete">June =
29,</span> 2016</td><td> </td><td class=3D"rblock">                      =
                                 <span class=3D"insert">September =
5,</span> 2016</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
  LISP Data-Plane Confidentiality</td><td> </td><td class=3D"right">     =
               LISP Data-Plane Confidentiality</td><td =
class=3D"lineno"></td></tr>
      <tr id=3D"diff0002"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
       draft-ietf-lisp-crypto-0<span class=3D"delete">6</span></td><td> =
</td><td class=3D"rblock">                       =
draft-ietf-lisp-crypto-0<span class=3D"insert">7</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Abstract</td><td> =
</td><td class=3D"right">Abstract</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
describes a mechanism for encrypting LISP encapsulated</td><td> </td><td =
class=3D"right">   This document describes a mechanism for encrypting =
LISP encapsulated</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   traffic.  The =
design describes how key exchange is achieved using</td><td> </td><td =
class=3D"right">   traffic.  The design describes how key exchange is =
achieved using</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   existing LISP =
control-plane mechanisms as well as how to secure the</td><td> </td><td =
class=3D"right">   existing LISP control-plane mechanisms as well as how =
to secure the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   LISP =
data-plane from third-party surveillance attacks.</td><td> </td><td =
class=3D"right">   LISP data-plane from third-party surveillance =
attacks.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Status of This =
Memo</td><td> </td><td class=3D"right">Status of This Memo</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-2" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> =
page 1, line 34<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> page 1, line 34<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are working documents of the Internet =
Engineering</td><td> </td><td class=3D"right">   Internet-Drafts are =
working documents of the Internet Engineering</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Task Force =
(IETF).  Note that other groups may also distribute</td><td> </td><td =
class=3D"right">   Task Force (IETF).  Note that other groups may also =
distribute</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   working =
documents as Internet-Drafts.  The list of current Internet-</td><td> =
</td><td class=3D"right">   working documents as Internet-Drafts.  The =
list of current Internet-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td> </td><td =
class=3D"right">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are draft documents valid for a maximum of six =
months</td><td> </td><td class=3D"right">   Internet-Drafts are draft =
documents valid for a maximum of six months</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and may be =
updated, replaced, or obsoleted by other documents at any</td><td> =
</td><td class=3D"right">   and may be updated, replaced, or obsoleted =
by other documents at any</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   time.  It is =
inappropriate to use Internet-Drafts as reference</td><td> </td><td =
class=3D"right">   time.  It is inappropriate to use Internet-Drafts as =
reference</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   material or to =
cite them other than as "work in progress."</td><td> </td><td =
class=3D"right">   material or to cite them other than as "work in =
progress."</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0003"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   This =
Internet-Draft will expire on <span class=3D"delete">December 31, =
2016</span>.</td><td> </td><td class=3D"rblock">   This Internet-Draft =
will expire on <span class=3D"insert">March 9, 2017</span>.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Copyright =
Notice</td><td> </td><td class=3D"right">Copyright Notice</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Copyright (c) =
2016 IETF Trust and the persons identified as the</td><td> </td><td =
class=3D"right">   Copyright (c) 2016 IETF Trust and the persons =
identified as the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   document =
authors.  All rights reserved.</td><td> </td><td class=3D"right">   =
document authors.  All rights reserved.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td =
class=3D"right">   This document is subject to BCP 78 and the IETF =
Trust's Legal</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Provisions =
Relating to IETF Documents</td><td> </td><td class=3D"right">   =
Provisions Relating to IETF Documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
(http://trustee.ietf.org/license-info) in effect on the date of</td><td> =
</td><td class=3D"right">   (http://trustee.ietf.org/license-info) in =
effect on the date of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   publication of =
this document.  Please review these documents</td><td> </td><td =
class=3D"right">   publication of this document.  Please review these =
documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-3" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> =
page 2, line 20<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> page 2, line 20<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   4.  Overview  =
. . . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td> =
</td><td class=3D"right">   4.  Overview  . . . . . . . . . . . . . . . =
. . . . . . . . . . .   3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   5.  =
Diffie-Hellman Key Exchange . . . . . . . . . . . . . . . . .   =
4</td><td> </td><td class=3D"right">   5.  Diffie-Hellman Key Exchange . =
. . . . . . . . . . . . . . . .   4</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   6.  Encoding =
and Transmitting Key Material  . . . . . . . . . . .   5</td><td> =
</td><td class=3D"right">   6.  Encoding and Transmitting Key Material  =
. . . . . . . . . . .   5</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   7.  Shared =
Keys used for the Data-Plane . . . . . . . . . . . . .   7</td><td> =
</td><td class=3D"right">   7.  Shared Keys used for the Data-Plane . . =
. . . . . . . . . . .   7</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   8.  Data-Plane =
Operation  . . . . . . . . . . . . . . . . . . . .   9</td><td> </td><td =
class=3D"right">   8.  Data-Plane Operation  . . . . . . . . . . . . . . =
. . . . . .   9</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   9.  Procedures =
for Encryption and Decryption  . . . . . . . . . .  10</td><td> </td><td =
class=3D"right">   9.  Procedures for Encryption and Decryption  . . . . =
. . . . . .  10</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   10. Dynamic =
Rekeying  . . . . . . . . . . . . . . . . . . . . . .  11</td><td> =
</td><td class=3D"right">   10. Dynamic Rekeying  . . . . . . . . . . . =
. . . . . . . . . . .  11</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   11. Future =
Work . . . . . . . . . . . . . . . . . . . . . . . . .  12</td><td> =
</td><td class=3D"right">   11. Future Work . . . . . . . . . . . . . . =
. . . . . . . . . . .  12</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   12. Security =
Considerations . . . . . . . . . . . . . . . . . . .  12</td><td> =
</td><td class=3D"right">   12. Security Considerations . . . . . . . . =
. . . . . . . . . . .  12</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     12.1.  SAAG =
Support . . . . . . . . . . . . . . . . . . . . . .  12</td><td> =
</td><td class=3D"right">     12.1.  SAAG Support . . . . . . . . . . . =
. . . . . . . . . . .  12</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0004"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     12.2.  =
LISP-Crypto Security Threats . . . . . . . . . . . . . .  1<span =
class=3D"delete">2</span></td><td> </td><td class=3D"rblock">     12.2.  =
LISP-Crypto Security Threats . . . . . . . . . . . . . .  1<span =
class=3D"insert">3</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   13. IANA =
Considerations . . . . . . . . . . . . . . . . . . . . .  13</td><td> =
</td><td class=3D"right">   13. IANA Considerations . . . . . . . . . . =
. . . . . . . . . . .  13</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0005"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   14. =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">13</span></td><td> </td><td class=3D"rblock">   14. =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">14</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     14.1.  =
Normative References . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">13</span></td><td> </td><td class=3D"rblock">     14.1. =
 Normative References . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">14</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     14.2.  =
Informative References . . . . . . . . . . . . . . . . .  15</td><td> =
</td><td class=3D"right">     14.2.  Informative References . . . . . . =
. . . . . . . . . . .  15</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0006"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Appendix A.  =
Acknowledgments  . . . . . . . . . . . . . . . . . .  1<span =
class=3D"delete">5</span></td><td> </td><td class=3D"rblock">   Appendix =
A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  1<span =
class=3D"insert">6</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Appendix B.  =
Document Change Log  . . . . . . . . . . . . . . . .  16</td><td> =
</td><td class=3D"right">   Appendix B.  Document Change Log  . . . . . =
. . . . . . . . . . .  16</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0007"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.1.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-06.txt</span>  =
. . . . . . . .  16</td><td> </td><td class=3D"rblock">     B.1.  =
Changes to <span class=3D"insert">draft-ietf-lisp-crypto-07.txt</span>  =
. . . . . . . .  16</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.2.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-05.txt</span>  =
. . . . . . . .  <span class=3D"delete">16</span></td><td> </td><td =
class=3D"rblock">     B.2.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-06.txt</span>  . . . . . . . .  =
<span class=3D"insert">17</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.3.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-04.txt</span>  =
. . . . . . . .  <span class=3D"delete">16</span></td><td> </td><td =
class=3D"rblock">     B.3.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-05.txt</span>  . . . . . . . .  =
<span class=3D"insert">17</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.4.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-03.txt</span>  =
. . . . . . . .  <span class=3D"delete">16</span></td><td> </td><td =
class=3D"rblock">     B.4.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-04.txt</span>  . . . . . . . .  =
<span class=3D"insert">17</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.5.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-02.txt</span>  =
. . . . . . . .  17</td><td> </td><td class=3D"rblock">     B.5.  =
Changes to <span class=3D"insert">draft-ietf-lisp-crypto-03.txt</span>  =
. . . . . . . .  17</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.6.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-01.txt</span>  =
. . . . . . . .  <span class=3D"delete">17</span></td><td> </td><td =
class=3D"rblock">     B.6.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-02.txt</span>  . . . . . . . .  =
<span class=3D"insert">18</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.7.  =
Changes to <span class=3D"delete">draft-ietf-lisp-crypto-00.txt</span>  =
. . . . . . . .  <span class=3D"delete">17</span></td><td> </td><td =
class=3D"rblock">     B.7.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-01.txt</span>  . . . . . . . .  =
<span class=3D"insert">18</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.8.  =
Changes to <span =
class=3D"delete">draft-farinacci-lisp-crypto-01.txt</span> . . . . . .  =
<span class=3D"delete">17</span></td><td> </td><td class=3D"rblock">     =
B.8.  Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-00.txt</span>  . . . . . . <span =
class=3D"insert">. .  18</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.9.  =
Changes to <span =
class=3D"delete">draft-farinacci-lisp-crypto-00.txt</span> . . . . . .  =
18</td><td> </td><td class=3D"rblock">     B.9.  Changes to <span =
class=3D"insert">draft-farinacci-lisp-crypto-01.txt</span> . . . . . .  =
18</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Authors' =
Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     <span =
class=3D"insert">B.10. Changes to draft-farinacci-lisp-crypto-00.txt . . =
. . . .  19</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   Authors' Addresses  . . . . . . . . . . . . =
. . . . . . . . . . .  <span class=3D"insert">19</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">1.  =
Introduction</td><td> </td><td class=3D"right">1.  Introduction</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The Locator/ID =
Separation Protocol [RFC6830] defines a set of</td><td> </td><td =
class=3D"right">   The Locator/ID Separation Protocol [RFC6830] defines =
a set of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   functions for =
routers to exchange information used to map from non-</td><td> </td><td =
class=3D"right">   functions for routers to exchange information used to =
map from non-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   routable =
Endpoint Identifiers (EIDs) to routable Routing Locators</td><td> =
</td><td class=3D"right">   routable Endpoint Identifiers (EIDs) to =
routable Routing Locators</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0008"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   (RLOCs).  =
LISP <span class=3D"delete">ITRs</span> and <span =
class=3D"delete">PITRs</span> encapsulate packets to <span =
class=3D"delete">ETRs</span> and <span =
class=3D"delete">RTRs.</span></td><td> </td><td class=3D"rblock">   =
(RLOCs).  LISP <span class=3D"insert">Ingress Tunnel Routers =
(ITRs)</span> and <span class=3D"insert">Proxy Ingress =
Tunnel</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Packets that =
arrive at the ITR or PITR are typically not <span =
class=3D"delete">modified.</span></td><td> </td><td class=3D"rblock"><span=
 class=3D"insert">   Routers (PITRs)</span> encapsulate packets to <span =
class=3D"insert">Egress Tunnel Routers (ETRs)</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">   Which</span> means no protection or privacy of the =
data is added.  If the</td><td> </td><td class=3D"rblock">   and <span =
class=3D"insert">Reencapsulating Tunnel Routers (RTRs).</span>  Packets =
that arrive at</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   source host =
encrypts the data stream then the encapsulated packets</td><td> </td><td =
class=3D"rblock">   the ITR or PITR are typically not <span =
class=3D"insert">modified, which</span> means no protection</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   can be =
encrypted but would be redundant.  However, when plaintext</td><td> =
</td><td class=3D"rblock">   or privacy of the data is added.  If the =
source host encrypts the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   packets are =
sent by hosts, this design can encrypt the user payload</td><td> =
</td><td class=3D"rblock">   data stream then the encapsulated packets =
can be encrypted but would</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   to maintain =
privacy on the path between the encapsulator (the ITR or</td><td> =
</td><td class=3D"rblock">   be redundant.  However, when plaintext =
packets are sent by hosts,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   PITR) to a =
decapsulator (ETR or RTR).  The encrypted payload is</td><td> </td><td =
class=3D"rblock">   this design can encrypt the user payload to maintain =
privacy on the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   =
unidirectional.  However, return traffic uses the same procedures =
but</td><td> </td><td class=3D"rblock">   path between the encapsulator =
(the ITR or PITR) to a decapsulator</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   with =
different key values by the same xTRs or potentially different</td><td> =
</td><td class=3D"rblock">   (ETR or RTR).  The encrypted payload is =
unidirectional.  However,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   xTRs when =
the paths between LISP sites are asymmetric.</td><td> </td><td =
class=3D"rblock">   return traffic uses the same procedures but with =
different key values</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   by the same xTRs or potentially different =
xTRs when the paths between</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   LISP sites are asymmetric.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0009"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   This =
document has the following requirements for the solution space:</td><td> =
</td><td class=3D"rblock">   This document has the following =
requirements <span class=3D"insert">(as well as the =
general</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   requirements from =
[RFC6973])</span> for the solution space:</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Do not =
require a separate Public Key Infrastructure (PKI) that is</td><td> =
</td><td class=3D"right">   o  Do not require a separate Public Key =
Infrastructure (PKI) that is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      out of =
scope of the LISP control-plane architecture.</td><td> </td><td =
class=3D"right">      out of scope of the LISP control-plane =
architecture.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  The budget =
for key exchange MUST be one round-trip time.  That is,</td><td> =
</td><td class=3D"right">   o  The budget for key exchange MUST be one =
round-trip time.  That is,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      only a two =
packet exchange can occur.</td><td> </td><td class=3D"right">      only =
a two packet exchange can occur.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Use =
symmetric keying so faster cryptography can be performed in</td><td> =
</td><td class=3D"right">   o  Use symmetric keying so faster =
cryptography can be performed in</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      the LISP =
data plane.</td><td> </td><td class=3D"right">      the LISP data =
plane.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-4" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> =
page 3, line 39<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> page 3, line 42<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The key words =
"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td =
class=3D"right">   The key words "MUST", "MUST NOT", "REQUIRED", =
"SHALL", "SHALL NOT",</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   "SHOULD", =
"SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</td><td> =
</td><td class=3D"right">   "SHOULD", "SHOULD NOT", "RECOMMENDED", =
"MAY", and "OPTIONAL" in this</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   document are =
to be interpreted as described in [RFC2119].</td><td> </td><td =
class=3D"right">   document are to be interpreted as described in =
[RFC2119].</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">3.  Definition of =
Terms</td><td> </td><td class=3D"right">3.  Definition of Terms</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   AEAD: =
Authenticated Encryption with Additional Data.</td><td> </td><td =
class=3D"right">   AEAD: Authenticated Encryption with Additional =
Data.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   ICV: Integrity =
Check Value.</td><td> </td><td class=3D"right">   ICV: Integrity Check =
Value.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0010"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">LCAF: LISP Canonical =
Address Format ([LCAF]).</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   xTR: A general =
reference to ITRs, ETRs, RTRs, and PxTRs.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.  =
Overview</td><td> </td><td class=3D"right">4.  Overview</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The approach =
proposed in this document is to NOT rely on the LISP</td><td> </td><td =
class=3D"right">   The approach proposed in this document is to NOT rely =
on the LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   mapping system =
(or any other key infrastructure system) to store</td><td> </td><td =
class=3D"right">   mapping system (or any other key infrastructure =
system) to store</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   security keys. =
 This will provide for a simpler and more secure</td><td> </td><td =
class=3D"right">   security keys.  This will provide for a simpler and =
more secure</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   mechanism.  =
Secret shared keys will be negotiated between the ITR and</td><td> =
</td><td class=3D"right">   mechanism.  Secret shared keys will be =
negotiated between the ITR and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   the ETR in =
Map-Request and Map-Reply messages.  Therefore, when an</td><td> =
</td><td class=3D"right">   the ETR in Map-Request and Map-Reply =
messages.  Therefore, when an</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   ITR needs to =
obtain the RLOC of an ETR, it will get security material</td><td> =
</td><td class=3D"right">   ITR needs to obtain the RLOC of an ETR, it =
will get security material</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   to compute a =
shared secret with the ETR.</td><td> </td><td class=3D"right">   to =
compute a shared secret with the ETR.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The ITR can =
compute 3 shared-secrets per ETR the ITR is encapsulating</td><td> =
</td><td class=3D"right">   The ITR can compute 3 shared-secrets per ETR =
the ITR is encapsulating</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   to.  When the =
ITR encrypts a packet before encapsulation, it will</td><td> </td><td =
class=3D"right">   to.  When the ITR encrypts a packet before =
encapsulation, it will</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   identify the =
key it used for the crypto calculation so the ETR knows</td><td> =
</td><td class=3D"right">   identify the key it used for the crypto =
calculation so the ETR knows</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   which key to =
use for decrypting the packet after decapsulation.  By</td><td> </td><td =
class=3D"right">   which key to use for decrypting the packet after =
decapsulation.  By</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   using key-ids =
in the LISP header, we can also get fast rekeying</td><td> </td><td =
class=3D"right">   using key-ids in the LISP header, we can also get =
fast rekeying</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
functionality.</td><td> </td><td class=3D"right">   =
functionality.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0011"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   <span =
class=3D"delete">When an ETR (when it is also an ITR) encapsulates =
packets to this ITR</span></td><td> </td><td class=3D"rblock">   The key =
management described in this documemnt is unidirectional from</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">   (when it is also an ETR), a separate key exchange =
and shared-secret</span></td><td> </td><td class=3D"rblock">   the ITR =
(the encapsulator) to the ETR (the decapsultor).</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">   computation is performed.</span>  The key management =
described in this</td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   documemnt is =
unidirectional from the ITR (the encapsulator) to the</td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   ETR (the =
decapsultor).</td><td> </td><td class=3D"rblock"></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">5.  =
Diffie-Hellman Key Exchange</td><td> </td><td class=3D"right">5.  =
Diffie-Hellman Key Exchange</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   LISP will use =
a Diffie-Hellman [RFC2631] key exchange sequence and</td><td> </td><td =
class=3D"right">   LISP will use a Diffie-Hellman [RFC2631] key exchange =
sequence and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   computation =
for computing a shared secret.  The Diffie-Hellman</td><td> </td><td =
class=3D"right">   computation for computing a shared secret.  The =
Diffie-Hellman</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   parameters =
will be passed via Cipher Suite code-points in Map-Request</td><td> =
</td><td class=3D"right">   parameters will be passed via Cipher Suite =
code-points in Map-Request</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and Map-Reply =
messages.</td><td> </td><td class=3D"right">   and Map-Reply =
messages.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Here is a =
brief description how Diff-Hellman works:</td><td> </td><td =
class=3D"right">   Here is a brief description how Diff-Hellman =
works:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-5" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> =
page 7, line 27<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> page 7, line 27<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   use.</td><td> =
</td><td class=3D"right">   use.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">7.  Shared Keys =
used for the Data-Plane</td><td> </td><td class=3D"right">7.  Shared =
Keys used for the Data-Plane</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When an ITR or =
PITR receives a Map-Reply accepting the Cipher Suite</td><td> </td><td =
class=3D"right">   When an ITR or PITR receives a Map-Reply accepting =
the Cipher Suite</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   sent in the =
Map-Request, it is ready to create data plane keys.  The</td><td> =
</td><td class=3D"right">   sent in the Map-Request, it is ready to =
create data plane keys.  The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   same process =
is followed by the ETR or RTR returning the Map-Reply.</td><td> </td><td =
class=3D"right">   same process is followed by the ETR or RTR returning =
the Map-Reply.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The first step =
is to create a shared secret, using the peer's shared</td><td> </td><td =
class=3D"right">   The first step is to create a shared secret, using =
the peer's shared</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Diffie-Hellman =
Public Key Material combined with device's own private</td><td> </td><td =
class=3D"right">   Diffie-Hellman Public Key Material combined with =
device's own private</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0012"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   keying =
material as described in Section 5.  The Diffie-Hellman <span =
class=3D"delete">group</span></td><td> </td><td class=3D"rblock">   =
keying material as described in Section 5.  The Diffie-Hellman</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   used is =
defined in the cipher suite sent in the <span =
class=3D"delete">Map-Request</span> and</td><td> </td><td =
class=3D"rblock">   <span class=3D"insert">parameters</span> used is =
defined in the cipher suite sent in the <span =
class=3D"insert">Map-</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   copied into =
the Map-Reply.</td><td> </td><td class=3D"rblock"><span class=3D"insert"> =
  Request</span> and copied into the Map-Reply.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The resulting =
shared secret is used to compute an AEAD-key for the</td><td> </td><td =
class=3D"right">   The resulting shared secret is used to compute an =
AEAD-key for the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   algorithms =
specified in the cipher suite.  A Key Derivation Function</td><td> =
</td><td class=3D"right">   algorithms specified in the cipher suite.  A =
Key Derivation Function</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   (KDF) in =
counter mode as specified by [NIST-SP800-108] is used to</td><td> =
</td><td class=3D"right">   (KDF) in counter mode as specified by =
[NIST-SP800-108] is used to</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   generate the =
data-plane keys.  The amount of keying material that is</td><td> =
</td><td class=3D"right">   generate the data-plane keys.  The amount of =
keying material that is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   derived =
depends on the algorithms in the cipher suite.</td><td> </td><td =
class=3D"right">   derived depends on the algorithms in the cipher =
suite.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The inputs to =
the KDF are as follows:</td><td> </td><td class=3D"right">   The inputs =
to the KDF are as follows:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  KDF =
function.  This is HMAC-SHA-256.</td><td> </td><td class=3D"right">   o  =
KDF function.  This is HMAC-SHA-256.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-6" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> =
page 7, line 51<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> page 7, line 51<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  A key for =
the KDF function.  This is the computed Diffie-Hellman</td><td> </td><td =
class=3D"right">   o  A key for the KDF function.  This is the computed =
Diffie-Hellman</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      shared =
secret.</td><td> </td><td class=3D"right">      shared secret.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Context =
that binds the use of the data-plane keys to this session.</td><td> =
</td><td class=3D"right">   o  Context that binds the use of the =
data-plane keys to this session.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      The context =
is made up of the following fields, which are</td><td> </td><td =
class=3D"right">      The context is made up of the following fields, =
which are</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
concatenated and provided as the data to be acted upon by the =
KDF</td><td> </td><td class=3D"right">      concatenated and provided as =
the data to be acted upon by the KDF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
function.</td><td> </td><td class=3D"right">      function.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Context:</td><td> </td><td class=3D"right">   Context:</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0013"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   o  A =
counter, represented as a two-octet value in network<span =
class=3D"delete">-</span>byte order.</td><td> </td><td class=3D"rblock"> =
  o  A counter, represented as a two-octet value in network<span =
class=3D"insert"> </span>byte order.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  The =
null-terminated string "lisp-crypto".</td><td> </td><td class=3D"right"> =
  o  The null-terminated string "lisp-crypto".</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0014"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   o  The ITR's =
nonce from the <span class=3D"delete">the</span> Map-Request the cipher =
suite was</td><td> </td><td class=3D"rblock">   o  The ITR's nonce from =
the Map-Request the cipher suite was included</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      included =
in.</td><td> </td><td class=3D"rblock">      in.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  The number =
of bits of keying material required (L), represented as</td><td> =
</td><td class=3D"right">   o  The number of bits of keying material =
required (L), represented as</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      a two-octet =
value in network byte order.</td><td> </td><td class=3D"right">      a =
two-octet value in network byte order.</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The counter =
value in the context is first set to 1.  When the amount</td><td> =
</td><td class=3D"right">   The counter value in the context is first =
set to 1.  When the amount</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   of keying =
material exceeds the number of bits returned by the KDF</td><td> =
</td><td class=3D"right">   of keying material exceeds the number of =
bits returned by the KDF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   function, then =
the KDF function is called again with the same inputs</td><td> </td><td =
class=3D"right">   function, then the KDF function is called again with =
the same inputs</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   except that =
the counter increments for each call.  When enough keying</td><td> =
</td><td class=3D"right">   except that the counter increments for each =
call.  When enough keying</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   material is =
returned, it is concatenated and used to create keys.</td><td> </td><td =
class=3D"right">   material is returned, it is concatenated and used to =
create keys.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-7" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> =
page 9, line 4<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> page 9, line 4<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">       where: =
context =3D 0x0002 || "lisp-crypto" || &lt;itr-nonce&gt; || =
0x0200</td><td> </td><td class=3D"right">       where: context =3D =
0x0002 || "lisp-crypto" || &lt;itr-nonce&gt; || 0x0200</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   key-material =3D=
 key-material-1 || key-material-2</td><td> </td><td class=3D"right">   =
key-material =3D key-material-1 || key-material-2</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   If the =
key-material is longer than the required number of bits (L),</td><td> =
</td><td class=3D"right">   If the key-material is longer than the =
required number of bits (L),</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   then only the =
most significant L bits are used.</td><td> </td><td class=3D"right">   =
then only the most significant L bits are used.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =46rom the =
derived key-material, the most significant 256 bits are used</td><td> =
</td><td class=3D"right">   =46rom the derived key-material, the most =
significant 256 bits are used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   for the =
AEAD-key by AEAD ciphers.  The 256-bit AEAD-key is divided</td><td> =
</td><td class=3D"right">   for the AEAD-key by AEAD ciphers.  The =
256-bit AEAD-key is divided</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0015"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   into a =
128-bit encryption key and a 128-bit integrity<span =
class=3D"delete">-</span>check key</td><td> </td><td class=3D"rblock">   =
into a 128-bit encryption key and a 128-bit integrity<span =
class=3D"insert"> </span>check key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   internal to =
the cipher used by the ITR.</td><td> </td><td class=3D"right">   =
internal to the cipher used by the ITR.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">8.  Data-Plane =
Operation</td><td> </td><td class=3D"right">8.  Data-Plane =
Operation</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The LISP =
encapsulation header [RFC6830] requires changes to encode</td><td> =
</td><td class=3D"right">   The LISP encapsulation header [RFC6830] =
requires changes to encode</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   the key-id for =
the key being used for encryption.</td><td> </td><td class=3D"right">   =
the key-id for the key being used for encryption.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     0            =
       1                   2                   3</td><td> </td><td =
class=3D"right">     0                   1                   2           =
        3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     0 1 2 3 4 5 =
6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">    =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-8" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> =
page 10, line 11<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> page 10, line =
11<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and use that =
key to encrypt all packet data that follows the LISP</td><td> </td><td =
class=3D"right">   and use that key to encrypt all packet data that =
follows the LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   header.  =
Therefore, the outer header, UDP header, and LISP header</td><td> =
</td><td class=3D"right">   header.  Therefore, the outer header, UDP =
header, and LISP header</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   travel as =
plaintext.</td><td> </td><td class=3D"right">   travel as =
plaintext.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   There is an =
open working group item to discuss if the data</td><td> </td><td =
class=3D"right">   There is an open working group item to discuss if the =
data</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encapsulation =
header needs change for encryption or any new</td><td> </td><td =
class=3D"right">   encapsulation header needs change for encryption or =
any new</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   applications.  =
This document proposes changes to the existing header</td><td> </td><td =
class=3D"right">   applications.  This document proposes changes to the =
existing header</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   so =
experimentation can continue without making large changes to =
the</td><td> </td><td class=3D"right">   so experimentation can continue =
without making large changes to the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   data-plane at =
this time.  This document allocates 2 bits of the</td><td> </td><td =
class=3D"right">   data-plane at this time.  This document allocates 2 =
bits of the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   previously =
unused 3 flag bits (note the R-bit above is still a</td><td> </td><td =
class=3D"right">   previously unused 3 flag bits (note the R-bit above =
is still a</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0016"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   reserved =
flag bit) for the KK bits.</td><td> </td><td class=3D"rblock">   =
reserved flag bit<span class=3D"insert"> as documented in =
[RFC6830]</span>) for the KK bits.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">9.  Procedures =
for Encryption and Decryption</td><td> </td><td class=3D"right">9.  =
Procedures for Encryption and Decryption</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When an ITR, =
PITR, or RTR encapsulate a packet and have already</td><td> </td><td =
class=3D"right">   When an ITR, PITR, or RTR encapsulate a packet and =
have already</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   computed an =
AEAD-key (detailed in section Section 7) that is</td><td> </td><td =
class=3D"right">   computed an AEAD-key (detailed in section Section 7) =
that is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   associated =
with a destination RLOC, the following encryption and</td><td> </td><td =
class=3D"right">   associated with a destination RLOC, the following =
encryption and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encapsulation =
procedures are performed:</td><td> </td><td class=3D"right">   =
encapsulation procedures are performed:</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   1.  The =
encapsulator creates an IV and prepends the IV value to the</td><td> =
</td><td class=3D"right">   1.  The encapsulator creates an IV and =
prepends the IV value to the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">       packet =
being encapsulated.  For GCM and Chacha cipher suites, the</td><td> =
</td><td class=3D"right">       packet being encapsulated.  For GCM and =
Chacha cipher suites, the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-9" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> =
page 12, line 36<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> page 12, line =
36<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">12.  Security =
Considerations</td><td> </td><td class=3D"right">12.  Security =
Considerations</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">12.1.  SAAG =
Support</td><td> </td><td class=3D"right">12.1.  SAAG Support</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The LISP =
working group received security advice and guidance from the</td><td> =
</td><td class=3D"right">   The LISP working group received security =
advice and guidance from the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Security Area =
Advisory Group (SAAG).  The SAAG has been involved</td><td> </td><td =
class=3D"right">   Security Area Advisory Group (SAAG).  The SAAG has =
been involved</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   early in the =
design process and their input and reviews have been</td><td> </td><td =
class=3D"right">   early in the design process and their input and =
reviews have been</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   included in =
this document.</td><td> </td><td class=3D"right">   included in this =
document.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0017"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Comments from the =
SAAG included:</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   1.  Do not use =
assymmetric ciphers in the data-plane.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   2.  Consider adding =
ECDH early in the design.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   3.  Add cipher =
suites because ciphers are created more frequently</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">       than protocols =
that use them.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   4.  Consider the =
newer AEAD technology so authentication comes with</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">       doing =
encryption.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">12.2.  =
LISP-Crypto Security Threats</td><td> </td><td class=3D"right">12.2.  =
LISP-Crypto Security Threats</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Since ITRs and =
ETRs participate in key exchange over a public non-</td><td> </td><td =
class=3D"right">   Since ITRs and ETRs participate in key exchange over =
a public non-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   secure =
network, a man-in-the-middle (MITM) could circumvent the key</td><td> =
</td><td class=3D"right">   secure network, a man-in-the-middle (MITM) =
could circumvent the key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   exchange and =
compromise data-plane confidentiality.  This can happen</td><td> =
</td><td class=3D"right">   exchange and compromise data-plane =
confidentiality.  This can happen</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   when the MITM =
is acting as a Map-Replier, provides its own public key</td><td> =
</td><td class=3D"right">   when the MITM is acting as a Map-Replier, =
provides its own public key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   so the ITR and =
the MITM generate a shared secret key among each</td><td> </td><td =
class=3D"right">   so the ITR and the MITM generate a shared secret key =
among each</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   other.  If the =
MITM is in the data path between the ITR and ETR, it</td><td> </td><td =
class=3D"right">   other.  If the MITM is in the data path between the =
ITR and ETR, it</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   can use the =
shared secret key to decrypt traffic from the ITR.</td><td> </td><td =
class=3D"right">   can use the shared secret key to decrypt traffic from =
the ITR.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-10" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 14, line =
49<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 15, line =
30<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC6090]  =
McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic</td><td> =
</td><td class=3D"right">   [RFC6090]  McGrew, D., Igoe, K., and M. =
Salter, "Fundamental Elliptic</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Curve Cryptography Algorithms", RFC 6090,</td><td> </td><td =
class=3D"right">              Curve Cryptography Algorithms", RFC =
6090,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              DOI =
10.17487/RFC6090, February 2011,</td><td> </td><td class=3D"right">      =
        DOI 10.17487/RFC6090, February 2011,</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
&lt;http://www.rfc-editor.org/info/rfc6090&gt;.</td><td> </td><td =
class=3D"right">              =
&lt;http://www.rfc-editor.org/info/rfc6090&gt;.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC6830]  =
Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The</td><td> =
</td><td class=3D"right">   [RFC6830]  Farinacci, D., Fuller, V., Meyer, =
D., and D. Lewis, "The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Locator/ID Separation Protocol (LISP)", RFC 6830,</td><td> </td><td =
class=3D"right">              Locator/ID Separation Protocol (LISP)", =
RFC 6830,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              DOI =
10.17487/RFC6830, January 2013,</td><td> </td><td class=3D"right">       =
       DOI 10.17487/RFC6830, January 2013,</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
&lt;http://www.rfc-editor.org/info/rfc6830&gt;.</td><td> </td><td =
class=3D"right">              =
&lt;http://www.rfc-editor.org/info/rfc6830&gt;.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0018"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">[RFC6973]  Cooper, =
A., Tschofenig, H., Aboba, B., Peterson, J.,</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">              Morris, =
J., Hansen, M., and R. Smith, "Privacy</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">              =
Considerations for Internet Protocols", RFC 6973,</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">              DOI =
10.17487/RFC6973, July 2013,</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">              =
&lt;http://www.rfc-editor.org/info/rfc6973&gt;.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC7539]  =
Nir, Y. and A. Langley, "ChaCha20 and Poly1305 for IETF</td><td> =
</td><td class=3D"right">   [RFC7539]  Nir, Y. and A. Langley, "ChaCha20 =
and Poly1305 for IETF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Protocols", RFC 7539, DOI 10.17487/RFC7539, May 2015,</td><td> </td><td =
class=3D"right">              Protocols", RFC 7539, DOI =
10.17487/RFC7539, May 2015,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
&lt;http://www.rfc-editor.org/info/rfc7539&gt;.</td><td> </td><td =
class=3D"right">              =
&lt;http://www.rfc-editor.org/info/rfc7539&gt;.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">14.2.  =
Informative References</td><td> </td><td class=3D"right">14.2.  =
Informative References</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [AES-CBC]  =
McGrew, D., Foley, J., and K. Paterson, "Authenticated</td><td> </td><td =
class=3D"right">   [AES-CBC]  McGrew, D., Foley, J., and K. Paterson, =
"Authenticated</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Encryption with AES-CBC and HMAC-SHA", draft-mcgrew-aead-</td><td> =
</td><td class=3D"right">              Encryption with AES-CBC and =
HMAC-SHA", draft-mcgrew-aead-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
aes-cbc-hmac-sha2-05.txt (work in progress).</td><td> </td><td =
class=3D"right">              aes-cbc-hmac-sha2-05.txt (work in =
progress).</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-11" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 16, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 16, line =
45<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   security =
expertise to make lisp-crypto as secure as the state of the</td><td> =
</td><td class=3D"right">   security expertise to make lisp-crypto as =
secure as the state of the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   art in =
cryptography.</td><td> </td><td class=3D"right">   art in =
cryptography.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   In addition, =
the support and suggestions from the SAAG working group</td><td> =
</td><td class=3D"right">   In addition, the support and suggestions =
from the SAAG working group</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   were helpful =
and appreciative.</td><td> </td><td class=3D"right">   were helpful and =
appreciative.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Appendix B.  =
Document Change Log</td><td> </td><td class=3D"right">Appendix B.  =
Document Change Log</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC Editor: =
Please delete this section on publication as RFC.]</td><td> </td><td =
class=3D"right">   [RFC Editor: Please delete this section on =
publication as RFC.]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0019"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1.  Changes =
to draft-ietf-lisp-crypto-06.txt</td><td> </td><td class=3D"rblock">B.1. =
 Changes to <span =
class=3D"insert">draft-ietf-lisp-crypto-07.txt</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Posted September =
2016.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Addressed =
comments from Routing Directorate reviewer Danny</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      =
McPherson.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">B.2.  Changes to</span> =
draft-ietf-lisp-crypto-06.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted June =
2016.</td><td> </td><td class=3D"right">   o  Posted June 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fixed =
IDnits errors.</td><td> </td><td class=3D"right">   o  Fixed IDnits =
errors.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0020"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">2</span>.  Changes to =
draft-ietf-lisp-crypto-05.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">3</span>.  Changes to =
draft-ietf-lisp-crypto-05.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted June =
2016.</td><td> </td><td class=3D"right">   o  Posted June 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Update =
document which reflects comments Luigi provided as document</td><td> =
</td><td class=3D"right">   o  Update document which reflects comments =
Luigi provided as document</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
shepherd.</td><td> </td><td class=3D"right">      shepherd.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0021"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">3</span>.  Changes to =
draft-ietf-lisp-crypto-04.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">4</span>.  Changes to =
draft-ietf-lisp-crypto-04.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted May =
2016.</td><td> </td><td class=3D"right">   o  Posted May 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Update =
document timer from expiration.</td><td> </td><td class=3D"right">   o  =
Update document timer from expiration.</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0022"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">4</span>.  Changes to =
draft-ietf-lisp-crypto-03.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">5</span>.  Changes to =
draft-ietf-lisp-crypto-03.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted =
December 2015.</td><td> </td><td class=3D"right">   o  Posted December =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Changed =
cipher suite allocations.  We now have 2 AES-CBC cipher</td><td> =
</td><td class=3D"right">   o  Changed cipher suite allocations.  We now =
have 2 AES-CBC cipher</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      suites for =
compatibility, 3 AES-GCM cipher suites that are faster</td><td> </td><td =
class=3D"right">      suites for compatibility, 3 AES-GCM cipher suites =
that are faster</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      ciphers =
that include AE and a Chacha20-Poly1305 cipher suite which</td><td> =
</td><td class=3D"right">      ciphers that include AE and a =
Chacha20-Poly1305 cipher suite which</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      is the =
fastest but not totally proven/accepted..</td><td> </td><td =
class=3D"right">      is the fastest but not totally =
proven/accepted..</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Remove =
1024-bit DH keys for key exchange.</td><td> </td><td class=3D"right">   =
o  Remove 1024-bit DH keys for key exchange.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-12" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 17, line =
13<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 18, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
endian).</td><td> </td><td class=3D"right">      endian).</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Remove =
A-bit from Security Type LCAF.  No need to do</td><td> </td><td =
class=3D"right">   o  Remove A-bit from Security Type LCAF.  No need to =
do</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
authentication only with the introduction of AEAD ciphers.  =
These</td><td> </td><td class=3D"right">      authentication only with =
the introduction of AEAD ciphers.  These</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      ciphers can =
do authentication.  So you get ciphertext for free.</td><td> </td><td =
class=3D"right">      ciphers can do authentication.  So you get =
ciphertext for free.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Remove =
language that refers to "encryption-key" and "integrity-</td><td> =
</td><td class=3D"right">   o  Remove language that refers to =
"encryption-key" and "integrity-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      key".  Used =
term "AEAD-key" that is used by the AEAD cipher suites</td><td> </td><td =
class=3D"right">      key".  Used term "AEAD-key" that is used by the =
AEAD cipher suites</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      that do =
encryption and authenticaiton internal to the cipher.</td><td> </td><td =
class=3D"right">      that do encryption and authenticaiton internal to =
the cipher.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0023"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">5</span>.  Changes to =
draft-ietf-lisp-crypto-02.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">6</span>.  Changes to =
draft-ietf-lisp-crypto-02.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted =
September 2015.</td><td> </td><td class=3D"right">   o  Posted September =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add cipher =
suite for Elliptic Curve 25519 DH exchange.</td><td> </td><td =
class=3D"right">   o  Add cipher suite for Elliptic Curve 25519 DH =
exchange.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add cipher =
suite for Chacha20/Poly1305 ciphers.</td><td> </td><td class=3D"right">  =
 o  Add cipher suite for Chacha20/Poly1305 ciphers.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0024"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">6</span>.  Changes to =
draft-ietf-lisp-crypto-01.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">7</span>.  Changes to =
draft-ietf-lisp-crypto-01.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted May =
2015.</td><td> </td><td class=3D"right">   o  Posted May 2015.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Create =
cipher suites and encode them in the Security LCAF.</td><td> </td><td =
class=3D"right">   o  Create cipher suites and encode them in the =
Security LCAF.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add IV to =
beginning of packet header and ICV to end of packet.</td><td> </td><td =
class=3D"right">   o  Add IV to beginning of packet header and ICV to =
end of packet.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  AEAD =
procedures are now part of encrpytion process.</td><td> </td><td =
class=3D"right">   o  AEAD procedures are now part of encrpytion =
process.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0025"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">7</span>.  Changes to =
draft-ietf-lisp-crypto-00.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">8</span>.  Changes to =
draft-ietf-lisp-crypto-00.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted =
January 2015.</td><td> </td><td class=3D"right">   o  Posted January =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Changing =
draft-farinacci-lisp-crypto-01 to draft-ietf-lisp-crypto-</td><td> =
</td><td class=3D"right">   o  Changing draft-farinacci-lisp-crypto-01 =
to draft-ietf-lisp-crypto-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      00.  This =
draft has become a working group document</td><td> </td><td =
class=3D"right">      00.  This draft has become a working group =
document</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add text to =
indicate the working group may work on a new data</td><td> </td><td =
class=3D"right">   o  Add text to indicate the working group may work on =
a new data</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
encapsulation header format for data-plane encryption.</td><td> </td><td =
class=3D"right">      encapsulation header format for data-plane =
encryption.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0026"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">8</span>.  Changes to =
draft-farinacci-lisp-crypto-01.txt</td><td> </td><td =
class=3D"rblock">B.<span class=3D"insert">9</span>.  Changes to =
draft-farinacci-lisp-crypto-01.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted July =
2014.</td><td> </td><td class=3D"right">   o  Posted July 2014.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add =
Group-ID to the encoding format of Key Material in a Security</td><td> =
</td><td class=3D"right">   o  Add Group-ID to the encoding format of =
Key Material in a Security</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Type LCAF =
and modify the IANA Considerations so this draft can use</td><td> =
</td><td class=3D"right">      Type LCAF and modify the IANA =
Considerations so this draft can use</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      key =
exchange parameters from the IANA registry.</td><td> </td><td =
class=3D"right">      key exchange parameters from the IANA =
registry.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Indicate =
that the R-bit in the Security Type LCAF is not used by</td><td> =
</td><td class=3D"right">   o  Indicate that the R-bit in the Security =
Type LCAF is not used by</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
lisp-crypto.</td><td> </td><td class=3D"right">      =
lisp-crypto.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-13" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 18, line =
20<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 19, line =
17<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
process.</td><td> </td><td class=3D"right">      process.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add text =
indicating that when RLOC-probing is used for RLOC</td><td> </td><td =
class=3D"right">   o  Add text indicating that when RLOC-probing is used =
for RLOC</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
reachability purposes and rekeying is not desired, that the =
same</td><td> </td><td class=3D"right">      reachability purposes and =
rekeying is not desired, that the same</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left">      key =
exchange parameters should be used so a reallocation of a</td><td> =
</td><td class=3D"right">      key exchange parameters should be used so =
a reallocation of a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      pubic key =
does not happen at the ETR.</td><td> </td><td class=3D"right">      =
pubic key does not happen at the ETR.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add text to =
indicate that ECDH can be used to reduce CPU</td><td> </td><td =
class=3D"right">   o  Add text to indicate that ECDH can be used to =
reduce CPU</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
requirements for computing shared secret-keys.</td><td> </td><td =
class=3D"right">      requirements for computing shared =
secret-keys.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0027"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">9</span>.  Changes to =
draft-farinacci-lisp-crypto-00.txt</td><td> </td><td =
class=3D"rblock">B.<span class=3D"insert">10</span>.  Changes to =
draft-farinacci-lisp-crypto-00.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Initial =
draft posted February 2014.</td><td> </td><td class=3D"right">   o  =
Initial draft posted February 2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Authors' =
Addresses</td><td> </td><td class=3D"right">Authors' Addresses</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Dino =
Farinacci</td><td> </td><td class=3D"right">   Dino Farinacci</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
lispers.net</td><td> </td><td class=3D"right">   lispers.net</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   San Jose, =
California  95120</td><td> </td><td class=3D"right">   San Jose, =
California  95120</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   USA</td><td> =
</td><td class=3D"right">   USA</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>

     <tr><td></td><td class=3D"left"></td><td> </td><td =
class=3D"right"></td><td></td></tr>
     <tr id=3D"end" bgcolor=3D"gray"><th colspan=3D"5" =
align=3D"center">&nbsp;End of changes. 27 change blocks.&nbsp;</th></tr>
     <tr class=3D"stats"><td></td><th><i>52 lines changed or =
deleted</i></th><th><i> </i></th><th><i>82 lines changed or =
added</i></th><td></td></tr>
     <tr><td colspan=3D"5" align=3D"center" class=3D"small"><br>This =
html diff was produced by rfcdiff 1.45. The latest version is available =
from <a =
href=3D"http://www.tools.ietf.org/tools/rfcdiff/">http://tools.ietf.org/to=
ols/rfcdiff/</a> </td></tr>
   </tbody></table>
  =20
  =20
</body></html>=

--Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2
Content-Disposition: attachment;
	filename=draft-ietf-lisp-crypto-07.txt
Content-Type: text/plain;
	name="draft-ietf-lisp-crypto-07.txt"
Content-Transfer-Encoding: quoted-printable





Internet Engineering Task Force                             D. Farinacci
Internet-Draft                                               lispers.net
Intended status: Experimental                                    B. Weis
Expires: March 9, 2017                                     cisco Systems
                                                       September 5, 2016


                    LISP Data-Plane Confidentiality
                       draft-ietf-lisp-crypto-07

Abstract

   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on March 9, 2017.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



Farinacci & Weis          Expires March 9, 2017                 [Page 1]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements Notation . . . . . . . . . . . . . . . . . . . .   3
   3.  Definition of Terms . . . . . . . . . . . . . . . . . . . . .   3
   4.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   5.  Diffie-Hellman Key Exchange . . . . . . . . . . . . . . . . .   4
   6.  Encoding and Transmitting Key Material  . . . . . . . . . . .   5
   7.  Shared Keys used for the Data-Plane . . . . . . . . . . . . .   7
   8.  Data-Plane Operation  . . . . . . . . . . . . . . . . . . . .   9
   9.  Procedures for Encryption and Decryption  . . . . . . . . . .  10
   10. Dynamic Rekeying  . . . . . . . . . . . . . . . . . . . . . .  11
   11. Future Work . . . . . . . . . . . . . . . . . . . . . . . . .  12
   12. Security Considerations . . . . . . . . . . . . . . . . . . .  12
     12.1.  SAAG Support . . . . . . . . . . . . . . . . . . . . . .  12
     12.2.  LISP-Crypto Security Threats . . . . . . . . . . . . . .  13
   13. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13
   14. References  . . . . . . . . . . . . . . . . . . . . . . . . .  14
     14.1.  Normative References . . . . . . . . . . . . . . . . . .  14
     14.2.  Informative References . . . . . . . . . . . . . . . . .  15
   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  16
   Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  16
     B.1.  Changes to draft-ietf-lisp-crypto-07.txt  . . . . . . . .  16
     B.2.  Changes to draft-ietf-lisp-crypto-06.txt  . . . . . . . .  17
     B.3.  Changes to draft-ietf-lisp-crypto-05.txt  . . . . . . . .  17
     B.4.  Changes to draft-ietf-lisp-crypto-04.txt  . . . . . . . .  17
     B.5.  Changes to draft-ietf-lisp-crypto-03.txt  . . . . . . . .  17
     B.6.  Changes to draft-ietf-lisp-crypto-02.txt  . . . . . . . .  18
     B.7.  Changes to draft-ietf-lisp-crypto-01.txt  . . . . . . . .  18
     B.8.  Changes to draft-ietf-lisp-crypto-00.txt  . . . . . . . .  18
     B.9.  Changes to draft-farinacci-lisp-crypto-01.txt . . . . . .  18
     B.10. Changes to draft-farinacci-lisp-crypto-00.txt . . . . . .  19
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  19

1.  Introduction

   The Locator/ID Separation Protocol [RFC6830] defines a set of
   functions for routers to exchange information used to map from non-
   routable Endpoint Identifiers (EIDs) to routable Routing Locators
   (RLOCs).  LISP Ingress Tunnel Routers (ITRs) and Proxy Ingress Tunnel
   Routers (PITRs) encapsulate packets to Egress Tunnel Routers (ETRs)
   and Reencapsulating Tunnel Routers (RTRs).  Packets that arrive at
   the ITR or PITR are typically not modified, which means no protection
   or privacy of the data is added.  If the source host encrypts the
   data stream then the encapsulated packets can be encrypted but would
   be redundant.  However, when plaintext packets are sent by hosts,
   this design can encrypt the user payload to maintain privacy on the
   path between the encapsulator (the ITR or PITR) to a decapsulator



Farinacci & Weis          Expires March 9, 2017                 [Page 2]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   (ETR or RTR).  The encrypted payload is unidirectional.  However,
   return traffic uses the same procedures but with different key values
   by the same xTRs or potentially different xTRs when the paths between
   LISP sites are asymmetric.

   This document has the following requirements (as well as the general
   requirements from [RFC6973]) for the solution space:

   o  Do not require a separate Public Key Infrastructure (PKI) that is
      out of scope of the LISP control-plane architecture.

   o  The budget for key exchange MUST be one round-trip time.  That is,
      only a two packet exchange can occur.

   o  Use symmetric keying so faster cryptography can be performed in
      the LISP data plane.

   o  Avoid a third-party trust anchor if possible.

   o  Provide for rekeying when secret keys are compromised.

   o  Support Authenticated Encryption with packet integrity checks.

   o  Support multiple cipher suites so new crypto algorithms can be
      easily introduced.

2.  Requirements Notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Definition of Terms

   AEAD: Authenticated Encryption with Additional Data.

   ICV: Integrity Check Value.

   LCAF: LISP Canonical Address Format ([LCAF]).

   xTR: A general reference to ITRs, ETRs, RTRs, and PxTRs.

4.  Overview

   The approach proposed in this document is to NOT rely on the LISP
   mapping system (or any other key infrastructure system) to store
   security keys.  This will provide for a simpler and more secure
   mechanism.  Secret shared keys will be negotiated between the ITR and



Farinacci & Weis          Expires March 9, 2017                 [Page 3]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   the ETR in Map-Request and Map-Reply messages.  Therefore, when an
   ITR needs to obtain the RLOC of an ETR, it will get security material
   to compute a shared secret with the ETR.

   The ITR can compute 3 shared-secrets per ETR the ITR is encapsulating
   to.  When the ITR encrypts a packet before encapsulation, it will
   identify the key it used for the crypto calculation so the ETR knows
   which key to use for decrypting the packet after decapsulation.  By
   using key-ids in the LISP header, we can also get fast rekeying
   functionality.

   The key management described in this documemnt is unidirectional from
   the ITR (the encapsulator) to the ETR (the decapsultor).

5.  Diffie-Hellman Key Exchange

   LISP will use a Diffie-Hellman [RFC2631] key exchange sequence and
   computation for computing a shared secret.  The Diffie-Hellman
   parameters will be passed via Cipher Suite code-points in Map-Request
   and Map-Reply messages.

   Here is a brief description how Diff-Hellman works:

   +----------------------------+---------+----------------------------+
   |              ITR           |         |           ETR              |
   +------+--------+------------+---------+------------+---------------+
   |Secret| Public | Calculates |  Sends  | Calculates | Public |Secret|
   +------|--------|------------|---------|------------|--------|------+
   |  i   |  p,g   |            | p,g --> |            |        |  e   |
   +------|--------|------------|---------|------------|--------|------+
   |  i   | p,g,I  |g^i mod p=3DI |  I -->  |            | p,g,I  |  e   =
|
   +------|--------|------------|---------|------------|--------|------+
   |  i   | p,g,I  |            |  <-- E  |g^e mod p=3DE |  p,g   |  e   =
|
   +------|--------|------------|---------|------------|--------|------+
   | i,s  |p,g,I,E |E^i mod p=3Ds |         |I^e mod p=3Ds |p,g,I,E | =
e,s  |
   +------|--------|------------|---------|------------|--------|------+

        Public-key exchange for computing a shared private key [DH]

   Diffie-Hellman parameters 'p' and 'g' must be the same values used by
   the ITR and ETR.  The ITR computes public-key 'I' and transmits 'I'
   in a Map-Request packet.  When the ETR receives the Map-Request, it
   uses parameters 'p' and 'g' to compute the ETR's public key 'E'.  The
   ETR transmits 'E' in a Map-Reply message.  At this point, the ETR has
   enough information to compute 's', the shared secret, by using 'I' as
   the base and the ETR's private key 'e' as the exponent.  When the ITR
   receives the Map-Reply, it uses the ETR's public-key 'E' with the
   ITR's private key 'i' to compute the same 's' shared secret the ETR



Farinacci & Weis          Expires March 9, 2017                 [Page 4]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   computed.  The value 'p' is used as a modulus to create the width of
   the shared secret 's' (see Section 6).

6.  Encoding and Transmitting Key Material

   The Diffie-Hellman key material is transmitted in Map-Request and
   Map-Reply messages.  Diffie-Hellman parameters are encoded in the
   LISP Security Type LCAF [LCAF].

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |           AFI =3D 16387         |     Rsvd1     |     Flags     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Type =3D 11   |      Rsvd2    |             6 + n             |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |   Key Count   |      Rsvd3    | Cipher Suite  |   Rsvd4     |R|
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |           Key Length          |     Public Key Material ...   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                    ... Public Key Material                    |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |              AFI =3D x          |       Locator Address ...     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Cipher Suite field contains DH Key Exchange and Cipher/Hash Functions

   The 'Key Count' field encodes the number of {'Key-Length', 'Key-
   Material'} fields included in the encoded LCAF.  The maximum number
   of keys that can be encoded are 3, each identified by key-id 1,
   followed by key-id 2, an finally key-id 3.

   The 'R' bit is not used for this use-case of the Security Type LCAF
   but is reserved for [LISP-DDT] security.  Therefore, the R bit is
   transmitted as 0 and ignored on receipt.
















Farinacci & Weis          Expires March 9, 2017                 [Page 5]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


 Cipher Suite 0:
    Reserved

 Cipher Suite 1:
    Diffie-Hellman Group: 2048-bit MODP [RFC3526]
    Encryption:  AES with 128-bit keys in CBC mode [AES-CBC]
    Integrity:   Integrated with [AES-CBC] AEAD_AES_128_CBC_HMAC_SHA_256
    IV length:   16 bytes

 Cipher Suite 2:
    Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]
    Encryption:  AES with 128-bit keys in CBC mode [AES-CBC]
    Integrity:   Integrated with [AES-CBC] AEAD_AES_128_CBC_HMAC_SHA_256
    IV length:   16 bytes

 Cipher Suite 3:
    Diffie-Hellman Group: 2048-bit MODP [RFC3526]
    Encryption:  AES with 128-bit keys in GCM mode [RFC5116]
    Integrity:   Integrated with [RFC5116] AEAD_AES_128_GCM
    IV length:   12 bytes

 Cipher Suite 4:
    Diffie-Hellman Group: 3072-bit MODP [RFC3526]
    Encryption:  AES with 128-bit keys in GCM mode [RFC5116]
    Integrity:   Integrated with [RFC5116] AEAD_AES_128_GCM
    IV length:   12 bytes

 Cipher Suite 5:
    Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]
    Encryption:  AES with 128-bit keys in GCM mode [RFC5116]
    Integrity:   Integrated with [RFC5116] AEAD_AES_128_GCM
    IV length:   12 bytes

 Cipher Suite 6:
     Diffie-Hellman Group: 256-bit Elliptic-Curve 25519 [CURVE25519]
     Encryption: Chacha20-Poly1305 [CHACHA-POLY] [RFC7539]
     Integrity:  Integrated with [CHACHA-POLY] AEAD_CHACHA20_POLY1305
     IV length:  8 bytes


   The "Public Key Material" field contains the public key generated by
   one of the Cipher Suites defined above.  The length of the key in
   octets is encoded in the "Key Length" field.

   When an ITR, PITR, or RTR sends a Map-Request, they will encode their
   own RLOC in the Security Type LCAF format within the ITR-RLOCs field.
   When a ETR or RTR sends a Map-Reply, they will encode their RLOCs in




Farinacci & Weis          Expires March 9, 2017                 [Page 6]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   Security Type LCAF format within the RLOC-record field of each EID-
   record supplied.

   If an ITR, PITR, or RTR sends a Map-Request with the Security Type
   LCAF included and the ETR or RTR does not want to have encapsulated
   traffic encrypted, they will return a Map-Reply with no RLOC records
   encoded with the Security Type LCAF.  This signals to the ITR, PITR
   or RTR not to encrypt traffic (it cannot encrypt traffic anyways
   since no ETR public-key was returned).

   Likewise, if an ITR or PITR wish to include multiple key-ids in the
   Map-Request but the ETR or RTR wish to use some but not all of the
   key-ids, they return a Map-Reply only for those key-ids they wish to
   use.

7.  Shared Keys used for the Data-Plane

   When an ITR or PITR receives a Map-Reply accepting the Cipher Suite
   sent in the Map-Request, it is ready to create data plane keys.  The
   same process is followed by the ETR or RTR returning the Map-Reply.

   The first step is to create a shared secret, using the peer's shared
   Diffie-Hellman Public Key Material combined with device's own private
   keying material as described in Section 5.  The Diffie-Hellman
   parameters used is defined in the cipher suite sent in the Map-
   Request and copied into the Map-Reply.

   The resulting shared secret is used to compute an AEAD-key for the
   algorithms specified in the cipher suite.  A Key Derivation Function
   (KDF) in counter mode as specified by [NIST-SP800-108] is used to
   generate the data-plane keys.  The amount of keying material that is
   derived depends on the algorithms in the cipher suite.

   The inputs to the KDF are as follows:

   o  KDF function.  This is HMAC-SHA-256.

   o  A key for the KDF function.  This is the computed Diffie-Hellman
      shared secret.

   o  Context that binds the use of the data-plane keys to this session.
      The context is made up of the following fields, which are
      concatenated and provided as the data to be acted upon by the KDF
      function.

   Context:

   o  A counter, represented as a two-octet value in network byte order.



Farinacci & Weis          Expires March 9, 2017                 [Page 7]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   o  The null-terminated string "lisp-crypto".

   o  The ITR's nonce from the Map-Request the cipher suite was included
      in.

   o  The number of bits of keying material required (L), represented as
      a two-octet value in network byte order.

   The counter value in the context is first set to 1.  When the amount
   of keying material exceeds the number of bits returned by the KDF
   function, then the KDF function is called again with the same inputs
   except that the counter increments for each call.  When enough keying
   material is returned, it is concatenated and used to create keys.

   For example, AES with 128-bit keys requires 16 octets (128 bits) of
   keying material, and HMAC-SHA1-96 requires another 16 octets (128
   bits) of keying material in order to maintain a consistent 128-bits
   of security.  Since 32 octets (256 bits) of keying material are
   required, and the KDF function HMAC-SHA-256 outputs 256 bits, only
   one call is required.  The inputs are as follows:

   key-material =3D HMAC-SHA-256(dh-shared-secret, context)

       where: context =3D 0x0001 || "lisp-crypto" || <itr-nonce> || =
0x0100

   In contrast, a cipher suite specifying AES with 256-bit keys requires
   32 octets (256 bits) of keying material, and HMAC-SHA256-128 requires
   another 32 octets (256 bits) of keying material in order to maintain
   a consistent 256-bits of security.  Since 64 octets (512 bits) of
   keying material are required, and the KDF function HMAC-SHA-256
   outputs 256 bits, two calls are required.

   key-material-1 =3D HMAC-SHA-256(dh-shared-secret, context)

       where: context =3D 0x0001 || "lisp-crypto" || <itr-nonce> || =
0x0200

   key-material-2 =3D HMAC-SHA-256(dh-shared-secret, context)

       where: context =3D 0x0002 || "lisp-crypto" || <itr-nonce> || =
0x0200

   key-material =3D key-material-1 || key-material-2

   If the key-material is longer than the required number of bits (L),
   then only the most significant L bits are used.

   =46rom the derived key-material, the most significant 256 bits are =
used
   for the AEAD-key by AEAD ciphers.  The 256-bit AEAD-key is divided




Farinacci & Weis          Expires March 9, 2017                 [Page 8]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   into a 128-bit encryption key and a 128-bit integrity check key
   internal to the cipher used by the ITR.

8.  Data-Plane Operation

   The LISP encapsulation header [RFC6830] requires changes to encode
   the key-id for the key being used for encryption.

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  / |       Source Port =3D xxxx      |       Dest Port =3D 4341        =
|
UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  \ |           UDP Length          |        UDP Checksum           |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L / |N|L|E|V|I|R|K|K|            Nonce/Map-Version                  |\ \
I   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |A
S \ |                 Instance ID/Locator-Status-Bits               | |D
P   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |/
    |                   Initialization Vector (IV)                  | I
E   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ C
n / |                                                               | V
c   |                                                               | |
r   |                Packet Payload with EID Header ...             | |
y   |                                                               | |
p \ |                                                               |/
t   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        K-bits indicate when packet is encrypted and which key used

   When the KK bits are 00, the encapsulated packet is not encrypted.
   When the value of the KK bits are 1, 2, or 3, it encodes the key-id
   of the secret keys computed during the Diffie-Hellman Map-Request/
   Map-Reply exchange.  When the KK bits are not 0, the payload is
   prepended with an Initialization Vector (IV).  The length of the IV
   field is based on the cipher suite used.  Since all cipher suites
   defined in this document do Authenticated Encryption (AEAD), an ICV
   field does not need to be present in the packet since it is included
   in the ciphertext.  The Additional Data (AD) used for the ICV is
   shown above and includes the LISP header, the IV field and the packet
   payload.

   When an ITR or PITR receives a packet to be encapsulated, they will
   first decide what key to use, encode the key-id into the LISP header,
   and use that key to encrypt all packet data that follows the LISP
   header.  Therefore, the outer header, UDP header, and LISP header
   travel as plaintext.




Farinacci & Weis          Expires March 9, 2017                 [Page 9]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   There is an open working group item to discuss if the data
   encapsulation header needs change for encryption or any new
   applications.  This document proposes changes to the existing header
   so experimentation can continue without making large changes to the
   data-plane at this time.  This document allocates 2 bits of the
   previously unused 3 flag bits (note the R-bit above is still a
   reserved flag bit as documented in [RFC6830]) for the KK bits.

9.  Procedures for Encryption and Decryption

   When an ITR, PITR, or RTR encapsulate a packet and have already
   computed an AEAD-key (detailed in section Section 7) that is
   associated with a destination RLOC, the following encryption and
   encapsulation procedures are performed:

   1.  The encapsulator creates an IV and prepends the IV value to the
       packet being encapsulated.  For GCM and Chacha cipher suites, the
       IV is incremented for every packet (beginning with a value of 1
       in the first packet) and sent to the destination RLOC.  For CBC
       cipher suites, the IV is a new random number for every packet
       sent to the destination RLOC.  For the Chacha cipher suite, the
       IV is an 8-byte random value that is appended to a 4-byte counter
       that is incremented for every packet (beginning with a value of 1
       in the first packet).

   2.  Next encrypt with cipher function AES or Chacha20 using the AEAD-
       key over the packet payload following the AEAD specification
       referenced in the cipher suite definition.  This does not include
       the IV.  The IV must be transmitted as plaintext so the decrypter
       can use it as input to the decryption cipher.  The payload should
       be padded to an integral number of bytes a block cipher may
       require.  The result of the AEAD operation may contain an ICV,
       the size of which is defined by the referenced AEAD
       specification.  Note that the AD (i.e. the LISP header exactly as
       will be prepended in the next step and the IV) must be given to
       the AEAD encryption function as the "associated data" argument.

   3.  Prepend the LISP header.  The key-id field of the LISP header is
       set to the key-id value that corresponds to key-pair used for the
       encryption cipher.

   4.  Lastly, prepend the UDP header and outer IP header onto the
       encrypted packet and send packet to destination RLOC.

   When an ETR, PETR, or RTR receive an encapsulated packet, the
   following decapsulation and decryption procedures are performed:





Farinacci & Weis          Expires March 9, 2017                [Page 10]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   1.  The outer IP header, UDP header, LISP header, and IV field are
       stripped from the start of the packet.  The LISP header and IV
       are retained and given to the AEAD decryption operation as the
       "associated data" argument.

   2.  The packet is decrypted using the AEAD-key and the IV from the
       packet.  The AEAD-key is obtained from a local-cache associated
       with the key-id value from the LISP header.  The result of the
       decryption function is a plaintext packet payload if the cipher
       returned a verified ICV.  Otherwise, the packet has been tampered
       with and is discarded.  If the AEAD specification included an
       ICV, the AEAD decryption function will locate the ICV in the
       ciphertext and compare it to a version of the ICV that the AEAD
       decryption function computes.  If the computed ICV is different
       than the ICV located in the ciphertext, then it will be
       considered tampered.

   3.  If the packet was not tampered with, the decrypted packet is
       forwarded to the destination EID.

10.  Dynamic Rekeying

   Since multiple keys can be encoded in both control and data messages,
   an ITR can encapsulate and encrypt with a specific key while it is
   negotiating other keys with the same ETR.  Soon as an ETR or RTR
   returns a Map-Reply, it should be prepared to decapsulate and decrypt
   using the new keys computed with the new Diffie-Hellman parameters
   received in the Map-Request and returned in the Map-Reply.

   RLOC-probing can be used to change keys or cipher suites by the ITR
   at any time.  And when an initial Map-Request is sent to populate the
   ITR's map-cache, the Map-Request flows across the mapping system
   where a single ETR from the Map-Reply RLOC-set will respond.  If the
   ITR decides to use the other RLOCs in the RLOC-set, it MUST send a
   Map-Request directly to negotiate security parameters with the ETR.
   This process may be used to test reachability from an ITR to an ETR
   initially when a map-cache entry is added for the first time, so an
   ITR can get both reachability status and keys negotiated with one
   Map-Request/Map-Reply exchange.

   A rekeying event is defined to be when an ITR or PITR changes the
   cipher suite or public-key in the Map-Request.  The ETR or RTR
   compares the cipher suite and public-key it last received from the
   ITR for the key-id, and if any value has changed, it computes a new
   public-key and cipher suite requested by the ITR from the Map-Request
   and returns it in the Map-Reply.  Now a new shared secret is computed
   and can be used for the key-id for encryption by the ITR and
   decryption by the ETR.  When the ITR or PITR starts this process of



Farinacci & Weis          Expires March 9, 2017                [Page 11]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   negotiating a new key, it must not use the corresponding key-id in
   encapsulated packets until it receives a Map-Reply from the ETR with
   the same cipher suite value it expects (the values it sent in a Map-
   Request).

   Note when RLOC-probing continues to maintain RLOC reachability and
   rekeying is not desirable, the ITR or RTR can either not include the
   Security Type LCAF in the Map-Request or supply the same key material
   as it received from the last Map-Reply from the ETR or RTR.  This
   approach signals to the ETR or RTR that no rekeying event is
   requested.

11.  Future Work

   For performance considerations, newer Elliptic-Curve Diffie-Hellman
   (ECDH) groups can be used as specified in [RFC4492] and [RFC6090] to
   reduce CPU cycles required to compute shared secret keys.

   For better security considerations as well as to be able to build
   faster software implementations, newer approaches to ciphers and
   authentication methods will be researched and tested.  Some examples
   are Chacha20 and Poly1305 [CHACHA-POLY] [RFC7539].

12.  Security Considerations

12.1.  SAAG Support

   The LISP working group received security advice and guidance from the
   Security Area Advisory Group (SAAG).  The SAAG has been involved
   early in the design process and their input and reviews have been
   included in this document.

   Comments from the SAAG included:

   1.  Do not use assymmetric ciphers in the data-plane.

   2.  Consider adding ECDH early in the design.

   3.  Add cipher suites because ciphers are created more frequently
       than protocols that use them.

   4.  Consider the newer AEAD technology so authentication comes with
       doing encryption.








Farinacci & Weis          Expires March 9, 2017                [Page 12]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


12.2.  LISP-Crypto Security Threats

   Since ITRs and ETRs participate in key exchange over a public non-
   secure network, a man-in-the-middle (MITM) could circumvent the key
   exchange and compromise data-plane confidentiality.  This can happen
   when the MITM is acting as a Map-Replier, provides its own public key
   so the ITR and the MITM generate a shared secret key among each
   other.  If the MITM is in the data path between the ITR and ETR, it
   can use the shared secret key to decrypt traffic from the ITR.

   Since LISP can secure Map-Replies by the authentication process
   specified in [LISP-SEC], the ITR can detect when a MITM has signed a
   Map-Reply for an EID-prefix it is not authoritative for.  When an ITR
   determines the signature verification fails, it discards and does not
   reuse the key exchange parameters, avoids using the ETR for
   encapsulation, and issues a severe log message to the network
   administrator.  Optionally, the ITR can send RLOC-probes to the
   compromised RLOC to determine if can reach the authoritative ETR.
   And when the ITR validates the signature of a Map-Reply, it can begin
   encrypting and encapsulating packets to the RLOC of ETR.

13.  IANA Considerations

   This document describes a mechanism for encrypting LISP encapsulated
   packets based on Diffie-Hellman key exchange procedures.  During the
   exchange the devices have to agree on a Cipher Suite used (i.e. the
   cipher and hash functions used to encrypt/decrypt and to sign/verify
   packets).  The 8-bit Cipher Suite field is reserved for such purpose
   in the security material section of the Map-Request and Map-Reply
   messages.

   This document requests IANA to create and maintain a new registry (as
   outlined in [RFC5226]) entitled "LISP Crypto Cipher Suite".  Initial
   values for the registry are provided below.  Future assignments are
   to be made on a First Come First Served Basis.
















Farinacci & Weis          Expires March 9, 2017                [Page 13]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   +-----+--------------------------------------------+------------+
   |Value| Suite                                      | Definition |
   +-----+--------------------------------------------+------------+
   |  0  | Reserved                                   | Section 6  |
   +-----+--------------------------------------------+------------+
   |  1  | LISP_2048MODP_AES128_CBC_SHA256            | Section 6  |
   +-----+--------------------------------------------+------------+
   |  2  | LISP_EC25519_AES128_CBC_SHA256             | Section 6  |
   +-----+--------------------------------------------+------------+
   |  3  | LISP_2048MODP_AES128_GCM                   | Section 6  |
   +-----+--------------------------------------------+------------+
   |  4  | LISP_3072MODP_AES128_GCM M-3072            | Section 6  |
   +-----+--------------------------------------------+------------+
   |  5  | LISP_256_EC25519_AES128_GCM                | Section 6  |
   +-----+--------------------------------------------+------------+
   |  6  | LISP_256_EC25519_CHACHA20_POLY1305         | Section 6  |
   +-----+--------------------------------------------+------------+

                         LISP Crypto Cipher Suites

14.  References

14.1.  Normative References

   [LCAF]     Farinacci, D., Meyer, D., and J. Snijders, "LISP Canonical
              Address Format", draft-ietf-lisp-lcaf-13.txt (work in
              progress).

   [NIST-SP800-108]
              "National Institute of Standards and Technology,
              "Recommendation for Key Derivation Using Pseudorandom
              Functions NIST SP800-108"", NIST SP 800-108, October 2009.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC2631]  Rescorla, E., "Diffie-Hellman Key Agreement Method",
              RFC 2631, DOI 10.17487/RFC2631, June 1999,
              <http://www.rfc-editor.org/info/rfc2631>.

   [RFC3526]  Kivinen, T. and M. Kojo, "More Modular Exponential (MODP)
              Diffie-Hellman groups for Internet Key Exchange (IKE)",
              RFC 3526, DOI 10.17487/RFC3526, May 2003,
              <http://www.rfc-editor.org/info/rfc3526>.





Farinacci & Weis          Expires March 9, 2017                [Page 14]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   [RFC4492]  Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B.
              Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites
              for Transport Layer Security (TLS)", RFC 4492,
              DOI 10.17487/RFC4492, May 2006,
              <http://www.rfc-editor.org/info/rfc4492>.

   [RFC5116]  McGrew, D., "An Interface and Algorithms for Authenticated
              Encryption", RFC 5116, DOI 10.17487/RFC5116, January 2008,
              <http://www.rfc-editor.org/info/rfc5116>.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              DOI 10.17487/RFC5226, May 2008,
              <http://www.rfc-editor.org/info/rfc5226>.

   [RFC6090]  McGrew, D., Igoe, K., and M. Salter, "Fundamental Elliptic
              Curve Cryptography Algorithms", RFC 6090,
              DOI 10.17487/RFC6090, February 2011,
              <http://www.rfc-editor.org/info/rfc6090>.

   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
              Locator/ID Separation Protocol (LISP)", RFC 6830,
              DOI 10.17487/RFC6830, January 2013,
              <http://www.rfc-editor.org/info/rfc6830>.

   [RFC6973]  Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
              Morris, J., Hansen, M., and R. Smith, "Privacy
              Considerations for Internet Protocols", RFC 6973,
              DOI 10.17487/RFC6973, July 2013,
              <http://www.rfc-editor.org/info/rfc6973>.

   [RFC7539]  Nir, Y. and A. Langley, "ChaCha20 and Poly1305 for IETF
              Protocols", RFC 7539, DOI 10.17487/RFC7539, May 2015,
              <http://www.rfc-editor.org/info/rfc7539>.

14.2.  Informative References

   [AES-CBC]  McGrew, D., Foley, J., and K. Paterson, "Authenticated
              Encryption with AES-CBC and HMAC-SHA", draft-mcgrew-aead-
              aes-cbc-hmac-sha2-05.txt (work in progress).

   [CHACHA-POLY]
              Langley, A., "ChaCha20 and Poly1305 based Cipher Suites
              for TLS", draft-agl-tls-chacha20poly1305-04 (work in
              progress).






Farinacci & Weis          Expires March 9, 2017                [Page 15]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   [CURVE25519]
              Bernstein, D., "Curve25519: new Diffie-Hellman speed
              records", Publication
              http://www.iacr.org/cryptodb/archive/2006/
              PKC/3351/3351.pdf.

   [DH]       "Diffie-Hellman key exchange", Wikipedia
              http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange.

   [LISP-DDT]
              Fuller, V., Lewis, D., Ermaagan, V., and A. Jain, "LISP
              Delegated Database Tree", draft-fuller-lisp-ddt-04 (work
              in progress).

   [LISP-SEC]
              Maino, F., Ermagan, V., Cabellos, A., and D. Saucez,
              "LISP-Secuirty (LISP-SEC)", draft-ietf-lisp-sec-10 (work
              in progress).

Appendix A.  Acknowledgments

   The authors would like to thank Dan Harkins, Joel Halpern, Fabio
   Maino, Ed Lopez, Roger Jorgensen, and Watson Ladd for their interest,
   suggestions, and discussions about LISP data-plane security.  An
   individual thank you to LISP WG chair Luigi Iannone for shepherding
   this document as well as contributing to the IANA Considerations
   section.

   The authors would like to give a special thank you to Ilari Liusvaara
   for his extensive commentary and discussion.  He has contributed his
   security expertise to make lisp-crypto as secure as the state of the
   art in cryptography.

   In addition, the support and suggestions from the SAAG working group
   were helpful and appreciative.

Appendix B.  Document Change Log

   [RFC Editor: Please delete this section on publication as RFC.]

B.1.  Changes to draft-ietf-lisp-crypto-07.txt

   o  Posted September 2016.

   o  Addressed comments from Routing Directorate reviewer Danny
      McPherson.





Farinacci & Weis          Expires March 9, 2017                [Page 16]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


B.2.  Changes to draft-ietf-lisp-crypto-06.txt

   o  Posted June 2016.

   o  Fixed IDnits errors.

B.3.  Changes to draft-ietf-lisp-crypto-05.txt

   o  Posted June 2016.

   o  Update document which reflects comments Luigi provided as document
      shepherd.

B.4.  Changes to draft-ietf-lisp-crypto-04.txt

   o  Posted May 2016.

   o  Update document timer from expiration.

B.5.  Changes to draft-ietf-lisp-crypto-03.txt

   o  Posted December 2015.

   o  Changed cipher suite allocations.  We now have 2 AES-CBC cipher
      suites for compatibility, 3 AES-GCM cipher suites that are faster
      ciphers that include AE and a Chacha20-Poly1305 cipher suite which
      is the fastest but not totally proven/accepted..

   o  Remove 1024-bit DH keys for key exchange.

   o  Make clear that AES and chacha20 ciphers use AEAD so part of
      encrytion/decryption does authentication.

   o  Make it more clear that separate key pairs are used in each
      direction between xTRs.

   o  Indicate that the IV length is different per cipher suite.

   o  Use a counter based IV for every packet for AEAD ciphers.
      Previously text said to use a random number.  But CBC ciphers, use
      a random number.

   o  Indicate that key material is sent in network byte order (big
      endian).

   o  Remove A-bit from Security Type LCAF.  No need to do
      authentication only with the introduction of AEAD ciphers.  These
      ciphers can do authentication.  So you get ciphertext for free.



Farinacci & Weis          Expires March 9, 2017                [Page 17]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   o  Remove language that refers to "encryption-key" and "integrity-
      key".  Used term "AEAD-key" that is used by the AEAD cipher suites
      that do encryption and authenticaiton internal to the cipher.

B.6.  Changes to draft-ietf-lisp-crypto-02.txt

   o  Posted September 2015.

   o  Add cipher suite for Elliptic Curve 25519 DH exchange.

   o  Add cipher suite for Chacha20/Poly1305 ciphers.

B.7.  Changes to draft-ietf-lisp-crypto-01.txt

   o  Posted May 2015.

   o  Create cipher suites and encode them in the Security LCAF.

   o  Add IV to beginning of packet header and ICV to end of packet.

   o  AEAD procedures are now part of encrpytion process.

B.8.  Changes to draft-ietf-lisp-crypto-00.txt

   o  Posted January 2015.

   o  Changing draft-farinacci-lisp-crypto-01 to draft-ietf-lisp-crypto-
      00.  This draft has become a working group document

   o  Add text to indicate the working group may work on a new data
      encapsulation header format for data-plane encryption.

B.9.  Changes to draft-farinacci-lisp-crypto-01.txt

   o  Posted July 2014.

   o  Add Group-ID to the encoding format of Key Material in a Security
      Type LCAF and modify the IANA Considerations so this draft can use
      key exchange parameters from the IANA registry.

   o  Indicate that the R-bit in the Security Type LCAF is not used by
      lisp-crypto.

   o  Add text to indicate that ETRs/RTRs can negotiate less number of
      keys from which the ITR/PITR sent in a Map-Request.






Farinacci & Weis          Expires March 9, 2017                [Page 18]
=0C
Internet-Draft       LISP Data-Plane Confidentiality      September 2016


   o  Add text explaining how LISP-SEC solves the problem when a man-in-
      the-middle becomes part of the Map-Request/Map-Reply key exchange
      process.

   o  Add text indicating that when RLOC-probing is used for RLOC
      reachability purposes and rekeying is not desired, that the same
      key exchange parameters should be used so a reallocation of a
      pubic key does not happen at the ETR.

   o  Add text to indicate that ECDH can be used to reduce CPU
      requirements for computing shared secret-keys.

B.10.  Changes to draft-farinacci-lisp-crypto-00.txt

   o  Initial draft posted February 2014.

Authors' Addresses

   Dino Farinacci
   lispers.net
   San Jose, California  95120
   USA

   Phone: 408-718-2001
   Email: farinacci@gmail.com


   Brian Weis
   cisco Systems
   170 West Tasman Drive
   San Jose, California  95124-1706
   USA

   Phone: 408-526-4796
   Email: bew@cisco.com
















Farinacci & Weis          Expires March 9, 2017                [Page 19]

--Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii







--Apple-Mail=_F5B063EC-7A1D-485E-8968-9CD81E984DD2--


From nobody Wed Sep  7 13:41:25 2016
Return-Path: <stig@venaas.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5D9912B2BB for <lisp@ietfa.amsl.com>; Wed,  7 Sep 2016 13:41:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=venaas-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dzuJ3-zqdo1X for <lisp@ietfa.amsl.com>; Wed,  7 Sep 2016 13:41:17 -0700 (PDT)
Received: from mail-lf0-x232.google.com (mail-lf0-x232.google.com [IPv6:2a00:1450:4010:c07::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49C0C12B287 for <lisp@ietf.org>; Wed,  7 Sep 2016 13:41:17 -0700 (PDT)
Received: by mail-lf0-x232.google.com with SMTP id u14so7035135lfd.1 for <lisp@ietf.org>; Wed, 07 Sep 2016 13:41:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=venaas-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=eo+7P5SumJnQtShPKG3lcDTb9tF5fiV3TYEraqv6oow=; b=Q+w6TPEs97J9hdLEwSndr0SuqO8vvizxohw6zqHh21bZUBjVGznmNJXOy6+iVyNknk fIDVvzUyEViN4oKWrfcglMsQpB5ReZkUOFUYhad1rB8YICH304R9GA3fDkQobjkOcRif pCwVTmj8crCAy2pPHbkJEmIVtGp7BESAPRBkzMtJSe3THk8UMpZJ+ck0i1L8CU7TbO7E O3y2OdTUcklaw34EyJ42/6lDiX7qaZdkzFBLC8e31xRVEcL4ngvACf/8vIrbGZYenXt0 KOsnK99Z6/sEYpUkDmJFfXtoJvpXGhq/aIfVfADuZzAreOEZ8bkB3RGve1tgBq0K5bvg kTEQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=eo+7P5SumJnQtShPKG3lcDTb9tF5fiV3TYEraqv6oow=; b=YzDiaKKimSyfhw2Sw7bfZN0MHuovxzTaGaRyTAWpWoZts/5QE2X1SoJfXYg6oiaD4K bNnMwjQdb8NOI4RImCGaqn1z3jHexkUJ8WQFeSa/NuNPIdn+Ds1+oBHpRQH1xUNFD6xS SkQH91lx8FQoV6gfeMANVBiWvqFZoUQmzYbUbHQu/XbpskOgO1QEnn3J3v/XlkvWBQBe zb7X6xjNnHUZm7Kxs6Zlmy/WnhgcYO0A64WKV9E6rMx9y4WxpFkwHc1b1USwZU+FCXlG BzwR9p9e48AjGQf3B7wI5QTOmtP0dK89ekKi1CHLI2/3/833srRCoOhanT/FmN4N3pgm gi4A==
X-Gm-Message-State: AE9vXwMH9f+HAe8o43+c8oDTE8mgB8HqRUzGwDq7qIHqrovqGNP71x5qgwv+lcCGyJcoQU2kGNAly27oAL1qnw==
X-Received: by 10.25.44.142 with SMTP id s136mr430206lfs.156.1473280875129; Wed, 07 Sep 2016 13:41:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.28.15 with HTTP; Wed, 7 Sep 2016 13:41:14 -0700 (PDT)
From: Stig Venaas <stig@venaas.com>
Date: Wed, 7 Sep 2016 13:41:14 -0700
Message-ID: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com>
To: rtg-ads@ietf.org
Content-Type: text/plain; charset=UTF-8
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/KHcyENwGluBA_rlv3iJgmfoQJfw>
Cc: rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Sep 2016 20:41:21 -0000

Hello,

I have been selected as the Routing Directorate reviewer for this
draft. The Routing Directorate seeks to review all routing or
routing-related drafts as they pass through IETF last call and IESG
review, and sometimes on special request. The purpose of the review is
to provide assistance to the Routing ADs. For more information about
the Routing Directorate, please see
http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Although these comments are primarily for the use of the Routing ADs,
it would be helpful if you could consider them along with any other
IETF Last Call comments that you receive, and strive to resolve them
through discussion or by updating the draft.

Document: draft-ietf-lisp-lcaf-14.txt
Reviewer: Stig Venaas
Review Date: 2016-09-07
IETF LC End Date:
Intended Status: Experimental

Summary:
I have some minor concerns about this document that I think should be
resolved before publication.

The draft is almost ready but there are several places where the text
is a bit unclear,
and where there could be potential interoperability issues if people
get it wrong. Here
are the issues I found in the order they appear in the document. They
are all mostly
minor issues, but a few of them are just nits.

In section 1 I find this sentence a bit misleading since [AFI] doesn't
talk about the formatting.

   Currently defined AFIs include IPv4 and IPv6 addresses, which are
   formatted according to code-points assigned in [AFI] as follows:

Is the formatting shown here for AFI 1 and 2 defined in another
document? It would be good to have a reference. If it is introduced
in this document, then it should not be in the introduction.

In section 2, first paragraph it says:
   There is an address family currently defined for IPv4 or IPv6
   addresses.

It would be better to say that address families are defined for IPv4
and IPv6 addresses.

In section 3 we have this paragraph:

   The Address Family AFI definitions from [AFI] only allocate code-
   points for the AFI value itself.  The length of the address or entity
   that follows is not defined and is implied based on conventional
   experience.  Where the LISP protocol uses LISP Canonical Addresses
   specifically, the address length definitions will be in this
   specification and take precedent over any other specification.

I'm not sure what conventional experience means. Please try to find a
better way to say it. Regarding the last sentence, what if a you want
to define new LCAF encodings in the future? Is it good to say that this
specification takes precedent over any other?

In section 3 we have this paragraph:

   Length:  this 16-bit field is in units of bytes and covers all of the
      LISP Canonical Address payload, starting and including the byte
      after the Length field.  So any LCAF encoded address will have a
      minimum length of 8 bytes when the Length field is 0.  The 8 bytes
      include the AFI, Flags, Type, Reserved, and Length fields.  When
      the AFI is not next to encoded address in a control message, then
      the encoded address will have a minimum length of 6 bytes when the
      Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
      and Length fields.

Can you phrase this differently? First it says that any LCAF encoded
address has a minimum length of 8, but then it goes on to say how it
sometimes is only 6. I understand what you're trying to say, but there
may be a better way of stating it.

In section 3 it says:

   Rsvd2:  this 8-bit field is reserved for future use and MUST be
      transmitted as 0 and ignored on receipt.

Some of the LCAFs specified in this document are using it though. Hence
you may need to change this text, and maybe not make it reserved.

The last sentence of section 3 is:

   Therefore, when a locator-set has a mix of AFI records and
   LCAF records, all LCAF records will appear after all the AFI records.

This is not necessarily true. Isn't it possible that one at some point
in the future might use other AFI records that have AFI > 16387? IANA
has assigned several values beyond 16387.

In 4.1 it says:
   AFI = x:  x can be any AFI value from [AFI].

Is 16387 always or sometimes allowed? Might be good to clarify that.
This also applies
to all the other LCAF types with similar language.

Section 4.4:

   RTR RLOC Address:  this is an encapsulation address used by an ITR or
      PITR which resides behind a NAT device.  This address is known to
      have state in a NAT device so packets can flow from it to the LISP
      ETR behind the NAT.  There can be one or more NAT Tunnel Router
      (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these
      set of fields.  The number of NTRs encoded is determined by the
      LCAF length field.  When there are no NTRs supplied, the NTR
      fields can be omitted and reflected by the LCAF length field or an
      AFI of 0 can be used to indicate zero NTRs encoded.

It is not quite clear to me if the NTR fields here are the RTR RLOC
addresses. Does no NTR fields mean that there are no RTR RLOC addresses?
If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
0), and that would have AFI 0?

Section 4.5 first paragraph:

   Multicast group information can be published in the mapping database.
   So a lookup on an group address EID can return a replication list of
   RLOC group addresses or RLOC unicast addresses.

Can you have a mix of group addresses and unicast addresses? It's also
not so clear from the format what source prefixes are. Are the source
prefixes the same as the unicast RLOCs mentioned above? Can you have
both multiple source addresses and then multiple group addresses? Can
they be in arbitrarty order, or all sources followed by all groups?
It seems one will need to inspect the address itself to tell whether it
is a unicast or multicast address. This is probably fine.

Section 4.6
Add description of Rsvd3.

Section 4.7
Add description of Rsvd3 and Rsvd4.

Section 4.10
In this section there are several examples of using the AFI List Type,
but I miss a general definition. It appears that there can be a variable
number of AFIs in the list. Any number > 0? It might be useful to have
a length field associated with each AFI, or is it OK that parsing fails if
an AFI is unknown, so that the address length is not known?

Section 4.10.3
Isn't it unusual to include the 0 termination? Since you know the
length it is not really needed. When parsing one will need to check
the length either way, what should one do it the string accidentally
is not 0-terminated?

Section 4.10.4
I'm assuming that the recursion is more generic than this example?
It might be worth trying to explain the more generic concept and
format, and make sure that this is described as just an example.

Section 4.10.5
This also appears to be just an example.

Section 5.2
   Key Field Num:  the number of fields (minus 1) the key can be broken
      up into.  The width of the fields are fixed length.  So for a key
      size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
      bytes in length.  Allowing for a reasonable number of 16 field
      separators, valid values range from 0 to 15.

It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
5 fields?

   Key Wildcard Fields:  describes which fields in the key are not used
      as part of the key lookup.  This wildcard encoding is a bitfield.
      Each bit is a don't-care bit for a corresponding field in the key.
      Bit 0 (the low-order bit) in this bitfield corresponds the first
      field, right-justified in the key, bit 1 the second field, and so
      on.  When a bit is set in the bitfield it is a don't-care bit and

What does right-justified mean? Does it mean that the first field is the
"low order" one? Basically at the end of the message? And the highest
order bit corresponds to the part of the key right after the wilcards?
I think this need to be explained better to ensure interoperability.

   Key:  the variable length key used to do a LISP Database Mapping
      lookup.  The length of the key is the value n (shown above) minus
      3.

Isn't it exactly the value n, since the length is n + 3?

Section 5.4
   Length value n:  length in bytes of fields that follow.
This is a bit confusing. I think 2+n is the length in bytes that follow
the lenght field. While n is the number of bytes after the JSON length.

Section 5.5

It says "AFI = x" twice in the diagram. Based on this and the way it
is described it might seem that the two AFI values must be the same
value x, but they can differ, right? I this applies to several other
messages types as well.

Section 7
It looks like the table in the IANA considerations doesn't include all
the types defined in this document.

I'm happy to discuss my comments if needed, and also review any
updates to this draft.

Stig


From nobody Wed Sep  7 14:12:15 2016
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CECCC12B1B9; Wed,  7 Sep 2016 14:12:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.722
X-Spam-Level: 
X-Spam-Status: No, score=-2.722 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DT26-9hvpxq0; Wed,  7 Sep 2016 14:12:12 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB80212B118; Wed,  7 Sep 2016 14:12:11 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id BFE8D1C003B; Wed,  7 Sep 2016 14:12:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1473282731; bh=JVQ7F2rjNsS5R1m9V9MAH2DS3pPWw6vh5N6hEFqpMLA=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=Jdc2tiVCnT22YRkdjHlRveNIRr7B3pEqeF41NSLMrNKYFgiQ3ObD6remvdOt8gVVn 8FRFlWJAIDJARCFfNqVicmANk5HizlGnKxFO6tmMDD8s1pgc3MppnMt7XZt6lYn+DM 5euEOI3ikIWAKJoWe/A+j/ew9WV5LJDh2fb4YJDY=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id D75CDD80038; Wed,  7 Sep 2016 14:12:10 -0700 (PDT)
To: Stig Venaas <stig@venaas.com>, rtg-ads@ietf.org
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <23099e24-4575-5231-84b9-8a5a6f6ab2be@joelhalpern.com>
Date: Wed, 7 Sep 2016 17:14:22 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.3.0
MIME-Version: 1.0
In-Reply-To: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/uSodtd4-kLWXNMkPSmQpBWeiOZc>
Cc: rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Sep 2016 21:12:14 -0000

Thanks Stig.  This looks very useful.

Authors, can you please respond?
Yours,
Joel

On 9/7/16 4:41 PM, Stig Venaas wrote:
> Hello,
>
> I have been selected as the Routing Directorate reviewer for this
> draft. The Routing Directorate seeks to review all routing or
> routing-related drafts as they pass through IETF last call and IESG
> review, and sometimes on special request. The purpose of the review is
> to provide assistance to the Routing ADs. For more information about
> the Routing Directorate, please see
> http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir
>
> Although these comments are primarily for the use of the Routing ADs,
> it would be helpful if you could consider them along with any other
> IETF Last Call comments that you receive, and strive to resolve them
> through discussion or by updating the draft.
>
> Document: draft-ietf-lisp-lcaf-14.txt
> Reviewer: Stig Venaas
> Review Date: 2016-09-07
> IETF LC End Date:
> Intended Status: Experimental
>
> Summary:
> I have some minor concerns about this document that I think should be
> resolved before publication.
>
> The draft is almost ready but there are several places where the text
> is a bit unclear,
> and where there could be potential interoperability issues if people
> get it wrong. Here
> are the issues I found in the order they appear in the document. They
> are all mostly
> minor issues, but a few of them are just nits.
>
> In section 1 I find this sentence a bit misleading since [AFI] doesn't
> talk about the formatting.
>
>    Currently defined AFIs include IPv4 and IPv6 addresses, which are
>    formatted according to code-points assigned in [AFI] as follows:
>
> Is the formatting shown here for AFI 1 and 2 defined in another
> document? It would be good to have a reference. If it is introduced
> in this document, then it should not be in the introduction.
>
> In section 2, first paragraph it says:
>    There is an address family currently defined for IPv4 or IPv6
>    addresses.
>
> It would be better to say that address families are defined for IPv4
> and IPv6 addresses.
>
> In section 3 we have this paragraph:
>
>    The Address Family AFI definitions from [AFI] only allocate code-
>    points for the AFI value itself.  The length of the address or entity
>    that follows is not defined and is implied based on conventional
>    experience.  Where the LISP protocol uses LISP Canonical Addresses
>    specifically, the address length definitions will be in this
>    specification and take precedent over any other specification.
>
> I'm not sure what conventional experience means. Please try to find a
> better way to say it. Regarding the last sentence, what if a you want
> to define new LCAF encodings in the future? Is it good to say that this
> specification takes precedent over any other?
>
> In section 3 we have this paragraph:
>
>    Length:  this 16-bit field is in units of bytes and covers all of the
>       LISP Canonical Address payload, starting and including the byte
>       after the Length field.  So any LCAF encoded address will have a
>       minimum length of 8 bytes when the Length field is 0.  The 8 bytes
>       include the AFI, Flags, Type, Reserved, and Length fields.  When
>       the AFI is not next to encoded address in a control message, then
>       the encoded address will have a minimum length of 6 bytes when the
>       Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
>       and Length fields.
>
> Can you phrase this differently? First it says that any LCAF encoded
> address has a minimum length of 8, but then it goes on to say how it
> sometimes is only 6. I understand what you're trying to say, but there
> may be a better way of stating it.
>
> In section 3 it says:
>
>    Rsvd2:  this 8-bit field is reserved for future use and MUST be
>       transmitted as 0 and ignored on receipt.
>
> Some of the LCAFs specified in this document are using it though. Hence
> you may need to change this text, and maybe not make it reserved.
>
> The last sentence of section 3 is:
>
>    Therefore, when a locator-set has a mix of AFI records and
>    LCAF records, all LCAF records will appear after all the AFI records.
>
> This is not necessarily true. Isn't it possible that one at some point
> in the future might use other AFI records that have AFI > 16387? IANA
> has assigned several values beyond 16387.
>
> In 4.1 it says:
>    AFI = x:  x can be any AFI value from [AFI].
>
> Is 16387 always or sometimes allowed? Might be good to clarify that.
> This also applies
> to all the other LCAF types with similar language.
>
> Section 4.4:
>
>    RTR RLOC Address:  this is an encapsulation address used by an ITR or
>       PITR which resides behind a NAT device.  This address is known to
>       have state in a NAT device so packets can flow from it to the LISP
>       ETR behind the NAT.  There can be one or more NAT Tunnel Router
>       (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these
>       set of fields.  The number of NTRs encoded is determined by the
>       LCAF length field.  When there are no NTRs supplied, the NTR
>       fields can be omitted and reflected by the LCAF length field or an
>       AFI of 0 can be used to indicate zero NTRs encoded.
>
> It is not quite clear to me if the NTR fields here are the RTR RLOC
> addresses. Does no NTR fields mean that there are no RTR RLOC addresses?
> If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
> 0), and that would have AFI 0?
>
> Section 4.5 first paragraph:
>
>    Multicast group information can be published in the mapping database.
>    So a lookup on an group address EID can return a replication list of
>    RLOC group addresses or RLOC unicast addresses.
>
> Can you have a mix of group addresses and unicast addresses? It's also
> not so clear from the format what source prefixes are. Are the source
> prefixes the same as the unicast RLOCs mentioned above? Can you have
> both multiple source addresses and then multiple group addresses? Can
> they be in arbitrarty order, or all sources followed by all groups?
> It seems one will need to inspect the address itself to tell whether it
> is a unicast or multicast address. This is probably fine.
>
> Section 4.6
> Add description of Rsvd3.
>
> Section 4.7
> Add description of Rsvd3 and Rsvd4.
>
> Section 4.10
> In this section there are several examples of using the AFI List Type,
> but I miss a general definition. It appears that there can be a variable
> number of AFIs in the list. Any number > 0? It might be useful to have
> a length field associated with each AFI, or is it OK that parsing fails if
> an AFI is unknown, so that the address length is not known?
>
> Section 4.10.3
> Isn't it unusual to include the 0 termination? Since you know the
> length it is not really needed. When parsing one will need to check
> the length either way, what should one do it the string accidentally
> is not 0-terminated?
>
> Section 4.10.4
> I'm assuming that the recursion is more generic than this example?
> It might be worth trying to explain the more generic concept and
> format, and make sure that this is described as just an example.
>
> Section 4.10.5
> This also appears to be just an example.
>
> Section 5.2
>    Key Field Num:  the number of fields (minus 1) the key can be broken
>       up into.  The width of the fields are fixed length.  So for a key
>       size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
>       bytes in length.  Allowing for a reasonable number of 16 field
>       separators, valid values range from 0 to 15.
>
> It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
> 5 fields?
>
>    Key Wildcard Fields:  describes which fields in the key are not used
>       as part of the key lookup.  This wildcard encoding is a bitfield.
>       Each bit is a don't-care bit for a corresponding field in the key.
>       Bit 0 (the low-order bit) in this bitfield corresponds the first
>       field, right-justified in the key, bit 1 the second field, and so
>       on.  When a bit is set in the bitfield it is a don't-care bit and
>
> What does right-justified mean? Does it mean that the first field is the
> "low order" one? Basically at the end of the message? And the highest
> order bit corresponds to the part of the key right after the wilcards?
> I think this need to be explained better to ensure interoperability.
>
>    Key:  the variable length key used to do a LISP Database Mapping
>       lookup.  The length of the key is the value n (shown above) minus
>       3.
>
> Isn't it exactly the value n, since the length is n + 3?
>
> Section 5.4
>    Length value n:  length in bytes of fields that follow.
> This is a bit confusing. I think 2+n is the length in bytes that follow
> the lenght field. While n is the number of bytes after the JSON length.
>
> Section 5.5
>
> It says "AFI = x" twice in the diagram. Based on this and the way it
> is described it might seem that the two AFI values must be the same
> value x, but they can differ, right? I this applies to several other
> messages types as well.
>
> Section 7
> It looks like the table in the IANA considerations doesn't include all
> the types defined in this document.
>
> I'm happy to discuss my comments if needed, and also review any
> updates to this draft.
>
> Stig
>


From nobody Wed Sep  7 14:31:56 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BC1B12B2EC; Wed,  7 Sep 2016 14:31:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQJjfQ_iOGmP; Wed,  7 Sep 2016 14:31:47 -0700 (PDT)
Received: from mail-pf0-x22c.google.com (mail-pf0-x22c.google.com [IPv6:2607:f8b0:400e:c00::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CE3512B278; Wed,  7 Sep 2016 14:31:47 -0700 (PDT)
Received: by mail-pf0-x22c.google.com with SMTP id g202so10480087pfb.0; Wed, 07 Sep 2016 14:31:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=jQBS1D6QUFiXKy9GJwzoGCD0JK3poDou0JoJ1B2a9Hc=; b=N8AcS6FWUxNscJi5TSkRbawZ59Zfl20owT0hDBMpqRNM4zyPpE0ZfAtjZfjD7mmH6L GxBL0g6z4bvUmb/hSWoFNbjJVSdZ4b2s3IwdICS7UiA1+foUPS0Xa/cI1fOEAs6BcsnW qAzx1YxRO4gFYMvhoYCuT/st+zqZf3vdciszWf/+6ZTT1DIXZ7P2hzCEBVDSoxrHcaEg KStE7kkiSYnC/BJ7diLdyQ5XM7AGW5xIwYN0rkz9lHiQQoYpxg2J6++f2VkNmhlc3Dxu 6d9V977wXENGAkMthBNjH2OiH8BUMK5vgx0lGgwaFlhbaD4klAWcvSjrXO0Gtoz2o2gb 5Qmw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=jQBS1D6QUFiXKy9GJwzoGCD0JK3poDou0JoJ1B2a9Hc=; b=ieQHlKcwUs9jXBbvYKYKZ8MoY8UL4bPA330e4VENizLEaT5B+sdk+Wg+xSX9LYE1tQ LMp+lNxyMRt95YBgifu0WPSYMKku3LB+LANXEly43t9+GVz7UtGgrO0VyC3zT0R8/z+Z aagRQxF475IDaytv+XTgb7nOB5gqozDzNTzS3fmQtEnUJ6qcqNfv0QVOKaEl+xzuuzsh HJM65pTOZTzyiux/bfRHUUsRoG0vII2ehnlRClrdUi1ZdnoD50YMRH77HVunz5GBQ3jO QO74xoweSXuZgteFWzbg57Tgweby13otvqspETtNGoIXT2+1GXqt52sLkqN9p1Yd9SNf /0Mw==
X-Gm-Message-State: AE9vXwPWKQfaRkuXiUPiHsi+yk4fwnjjg9kP4l9MYMQ/LdEscFiru9aiv8q5hrmAta3iLQ==
X-Received: by 10.98.71.150 with SMTP id p22mr34409153pfi.156.1473283906619; Wed, 07 Sep 2016 14:31:46 -0700 (PDT)
Received: from [13.7.28.189] ([13.7.28.189]) by smtp.gmail.com with ESMTPSA id h66sm27936649pfc.47.2016.09.07.14.31.44 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 07 Sep 2016 14:31:45 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <23099e24-4575-5231-84b9-8a5a6f6ab2be@joelhalpern.com>
Date: Wed, 7 Sep 2016 14:31:44 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <6AF00186-F8C4-4169-9960-BF3EF572D0D4@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <23099e24-4575-5231-84b9-8a5a6f6ab2be@joelhalpern.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/awYciaCcRiYGRTbrWhBIGotM7F0>
Cc: rtg-ads@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org, rtg-dir@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Sep 2016 21:31:50 -0000

I will try to respond tomorrow. Thanks for your comments Stig.

Dino

> On Sep 7, 2016, at 2:14 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> 
> Thanks Stig.  This looks very useful.
> 
> Authors, can you please respond?
> Yours,
> Joel
> 
> On 9/7/16 4:41 PM, Stig Venaas wrote:
>> Hello,
>> 
>> I have been selected as the Routing Directorate reviewer for this
>> draft. The Routing Directorate seeks to review all routing or
>> routing-related drafts as they pass through IETF last call and IESG
>> review, and sometimes on special request. The purpose of the review is
>> to provide assistance to the Routing ADs. For more information about
>> the Routing Directorate, please see
>> http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir
>> 
>> Although these comments are primarily for the use of the Routing ADs,
>> it would be helpful if you could consider them along with any other
>> IETF Last Call comments that you receive, and strive to resolve them
>> through discussion or by updating the draft.
>> 
>> Document: draft-ietf-lisp-lcaf-14.txt
>> Reviewer: Stig Venaas
>> Review Date: 2016-09-07
>> IETF LC End Date:
>> Intended Status: Experimental
>> 
>> Summary:
>> I have some minor concerns about this document that I think should be
>> resolved before publication.
>> 
>> The draft is almost ready but there are several places where the text
>> is a bit unclear,
>> and where there could be potential interoperability issues if people
>> get it wrong. Here
>> are the issues I found in the order they appear in the document. They
>> are all mostly
>> minor issues, but a few of them are just nits.
>> 
>> In section 1 I find this sentence a bit misleading since [AFI] doesn't
>> talk about the formatting.
>> 
>>   Currently defined AFIs include IPv4 and IPv6 addresses, which are
>>   formatted according to code-points assigned in [AFI] as follows:
>> 
>> Is the formatting shown here for AFI 1 and 2 defined in another
>> document? It would be good to have a reference. If it is introduced
>> in this document, then it should not be in the introduction.
>> 
>> In section 2, first paragraph it says:
>>   There is an address family currently defined for IPv4 or IPv6
>>   addresses.
>> 
>> It would be better to say that address families are defined for IPv4
>> and IPv6 addresses.
>> 
>> In section 3 we have this paragraph:
>> 
>>   The Address Family AFI definitions from [AFI] only allocate code-
>>   points for the AFI value itself.  The length of the address or entity
>>   that follows is not defined and is implied based on conventional
>>   experience.  Where the LISP protocol uses LISP Canonical Addresses
>>   specifically, the address length definitions will be in this
>>   specification and take precedent over any other specification.
>> 
>> I'm not sure what conventional experience means. Please try to find a
>> better way to say it. Regarding the last sentence, what if a you want
>> to define new LCAF encodings in the future? Is it good to say that this
>> specification takes precedent over any other?
>> 
>> In section 3 we have this paragraph:
>> 
>>   Length:  this 16-bit field is in units of bytes and covers all of the
>>      LISP Canonical Address payload, starting and including the byte
>>      after the Length field.  So any LCAF encoded address will have a
>>      minimum length of 8 bytes when the Length field is 0.  The 8 bytes
>>      include the AFI, Flags, Type, Reserved, and Length fields.  When
>>      the AFI is not next to encoded address in a control message, then
>>      the encoded address will have a minimum length of 6 bytes when the
>>      Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
>>      and Length fields.
>> 
>> Can you phrase this differently? First it says that any LCAF encoded
>> address has a minimum length of 8, but then it goes on to say how it
>> sometimes is only 6. I understand what you're trying to say, but there
>> may be a better way of stating it.
>> 
>> In section 3 it says:
>> 
>>   Rsvd2:  this 8-bit field is reserved for future use and MUST be
>>      transmitted as 0 and ignored on receipt.
>> 
>> Some of the LCAFs specified in this document are using it though. Hence
>> you may need to change this text, and maybe not make it reserved.
>> 
>> The last sentence of section 3 is:
>> 
>>   Therefore, when a locator-set has a mix of AFI records and
>>   LCAF records, all LCAF records will appear after all the AFI records.
>> 
>> This is not necessarily true. Isn't it possible that one at some point
>> in the future might use other AFI records that have AFI > 16387? IANA
>> has assigned several values beyond 16387.
>> 
>> In 4.1 it says:
>>   AFI = x:  x can be any AFI value from [AFI].
>> 
>> Is 16387 always or sometimes allowed? Might be good to clarify that.
>> This also applies
>> to all the other LCAF types with similar language.
>> 
>> Section 4.4:
>> 
>>   RTR RLOC Address:  this is an encapsulation address used by an ITR or
>>      PITR which resides behind a NAT device.  This address is known to
>>      have state in a NAT device so packets can flow from it to the LISP
>>      ETR behind the NAT.  There can be one or more NAT Tunnel Router
>>      (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these
>>      set of fields.  The number of NTRs encoded is determined by the
>>      LCAF length field.  When there are no NTRs supplied, the NTR
>>      fields can be omitted and reflected by the LCAF length field or an
>>      AFI of 0 can be used to indicate zero NTRs encoded.
>> 
>> It is not quite clear to me if the NTR fields here are the RTR RLOC
>> addresses. Does no NTR fields mean that there are no RTR RLOC addresses?
>> If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
>> 0), and that would have AFI 0?
>> 
>> Section 4.5 first paragraph:
>> 
>>   Multicast group information can be published in the mapping database.
>>   So a lookup on an group address EID can return a replication list of
>>   RLOC group addresses or RLOC unicast addresses.
>> 
>> Can you have a mix of group addresses and unicast addresses? It's also
>> not so clear from the format what source prefixes are. Are the source
>> prefixes the same as the unicast RLOCs mentioned above? Can you have
>> both multiple source addresses and then multiple group addresses? Can
>> they be in arbitrarty order, or all sources followed by all groups?
>> It seems one will need to inspect the address itself to tell whether it
>> is a unicast or multicast address. This is probably fine.
>> 
>> Section 4.6
>> Add description of Rsvd3.
>> 
>> Section 4.7
>> Add description of Rsvd3 and Rsvd4.
>> 
>> Section 4.10
>> In this section there are several examples of using the AFI List Type,
>> but I miss a general definition. It appears that there can be a variable
>> number of AFIs in the list. Any number > 0? It might be useful to have
>> a length field associated with each AFI, or is it OK that parsing fails if
>> an AFI is unknown, so that the address length is not known?
>> 
>> Section 4.10.3
>> Isn't it unusual to include the 0 termination? Since you know the
>> length it is not really needed. When parsing one will need to check
>> the length either way, what should one do it the string accidentally
>> is not 0-terminated?
>> 
>> Section 4.10.4
>> I'm assuming that the recursion is more generic than this example?
>> It might be worth trying to explain the more generic concept and
>> format, and make sure that this is described as just an example.
>> 
>> Section 4.10.5
>> This also appears to be just an example.
>> 
>> Section 5.2
>>   Key Field Num:  the number of fields (minus 1) the key can be broken
>>      up into.  The width of the fields are fixed length.  So for a key
>>      size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
>>      bytes in length.  Allowing for a reasonable number of 16 field
>>      separators, valid values range from 0 to 15.
>> 
>> It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
>> 5 fields?
>> 
>>   Key Wildcard Fields:  describes which fields in the key are not used
>>      as part of the key lookup.  This wildcard encoding is a bitfield.
>>      Each bit is a don't-care bit for a corresponding field in the key.
>>      Bit 0 (the low-order bit) in this bitfield corresponds the first
>>      field, right-justified in the key, bit 1 the second field, and so
>>      on.  When a bit is set in the bitfield it is a don't-care bit and
>> 
>> What does right-justified mean? Does it mean that the first field is the
>> "low order" one? Basically at the end of the message? And the highest
>> order bit corresponds to the part of the key right after the wilcards?
>> I think this need to be explained better to ensure interoperability.
>> 
>>   Key:  the variable length key used to do a LISP Database Mapping
>>      lookup.  The length of the key is the value n (shown above) minus
>>      3.
>> 
>> Isn't it exactly the value n, since the length is n + 3?
>> 
>> Section 5.4
>>   Length value n:  length in bytes of fields that follow.
>> This is a bit confusing. I think 2+n is the length in bytes that follow
>> the lenght field. While n is the number of bytes after the JSON length.
>> 
>> Section 5.5
>> 
>> It says "AFI = x" twice in the diagram. Based on this and the way it
>> is described it might seem that the two AFI values must be the same
>> value x, but they can differ, right? I this applies to several other
>> messages types as well.
>> 
>> Section 7
>> It looks like the table in the IANA considerations doesn't include all
>> the types defined in this document.
>> 
>> I'm happy to discuss my comments if needed, and also review any
>> updates to this draft.
>> 
>> Stig
>> 


From nobody Thu Sep  8 00:42:19 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id DADC612B109; Thu,  8 Sep 2016 00:42:14 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.31.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147332053489.7457.13357960738561807033.idtracker@ietfa.amsl.com>
Date: Thu, 08 Sep 2016 00:42:14 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ZHu7mSc6Jj9x3QE3WG9Yx9Hx12M>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-type-iana-01.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2016 07:42:15 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Experimental Message & IANA Registry for LISP Packet Type Allocations
        Authors         : Mohamed Boucadair
                          Christian Jacquenet
	Filename        : draft-ietf-lisp-type-iana-01.txt
	Pages           : 5
	Date            : 2016-09-08

Abstract:
   This document defines a registry for LISP Packet Type allocations.
   It also specifies a shared LISP message type for experimentation
   purposes.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-type-iana/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-type-iana-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-type-iana-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Sep  8 13:06:08 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id EC85A12B1E6; Thu,  8 Sep 2016 13:06:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.32.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147336516396.21882.3780019816243874818.idtracker@ietfa.amsl.com>
Date: Thu, 08 Sep 2016 13:06:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/8rvG4LwYkm0xu9yP0iFr5pe2caE>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-ddt-08.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2016 20:06:04 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Delegated Database Tree
        Authors         : Vince Fuller
                          Darrel Lewis
                          Vina Ermagan
                          Amit Jain
                          Anton Smirnov
	Filename        : draft-ietf-lisp-ddt-08.txt
	Pages           : 37
	Date            : 2016-09-08

Abstract:
   This document describes the LISP Delegated Database Tree (LISP-DDT),
   a hierarchical, distributed database which embodies the delegation of
   authority to provide mappings from LISP Endpoint Identifiers (EIDs)
   to Routing Locators (RLOCs).  It is a statically-defined distribution
   of the EID namespace among a set of LISP-speaking servers, called DDT
   nodes.  Each DDT node is configured as "authoritative" for one or
   more EID-prefixes, along with the set of RLOCs for Map Servers or
   "child" DDT nodes to which more-specific EID-prefixes are delegated.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-ddt/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-ddt-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-ddt-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Sep  8 14:03:28 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EF6512B258; Thu,  8 Sep 2016 14:03:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.288
X-Spam-Level: 
X-Spam-Status: No, score=-1.288 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, T_HTML_ATTACH=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n6xPIi3miANz; Thu,  8 Sep 2016 14:03:15 -0700 (PDT)
Received: from mail-oi0-x233.google.com (mail-oi0-x233.google.com [IPv6:2607:f8b0:4003:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8248C12B0CA; Thu,  8 Sep 2016 14:03:15 -0700 (PDT)
Received: by mail-oi0-x233.google.com with SMTP id s131so90239146oie.2; Thu, 08 Sep 2016 14:03:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=UjpFVFvIE2uXflcL07c6LmkSCfqlgKob5QTeyEXQB60=; b=dRt3fMQdrONRQUUCV5MKM7cBuBRFyrZzvSbGLXYLs8oyKzUSxcSfv9hjaaVw9pvhBd NtQ1i823aXpuJa8W2gLRQf2Z7FSS/cxUFA4bBIo6CblHkAlHMMwIn6gBxwn88QTn03BJ X+7ORkzUffpoyPY5hxliOZIolTSIt6Zh8bktA0knKKj0p4hu95Q3qK3M7d7X3oX5bxY1 j1adWVBi7DlL6/MiAQUq8BSAoZRuigdjTFv48G1BYYf5Dc/lLE7RxenJaIAp/PYp6GXn Q8CNpCSHRZv9zT9jL1/8MG8PR/esF2JLFTvrOox4j+M3w4APKQMdUJtDR9f/YJGi+xhV KSDA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=UjpFVFvIE2uXflcL07c6LmkSCfqlgKob5QTeyEXQB60=; b=GSlgTAatHpkhDRHWI6butd5RzfYxobykphvrUhYYxCp9VFoK74sXAJJID85eM2dE2C xBL7+vta8RyYHH7tIxZz6u4AHoB+bBlYeKz8okHjAbmme48sJB6QTu60qQMoZc3jtY78 9qvhXIGHtDP6GfBXzQkk+Otu7O2IgdIJMFHikI8wWCnNhhyya2AeGLTLjU2e+SWD037D okXN5ZA60Nc5NWRfgtW0w2od48RkOGuj+WWF4vJGZgCQsRNK11iVIUclmJm1xf3upLqz o4ZCV94RDbM/dMvm251jTz6uicYOPhWSvgWtATCEvg0Olocp4S3FsMiAwMWB3s86yrYJ uWMg==
X-Gm-Message-State: AE9vXwMufu3cTs8X0dY5q1g3H0YDaXlQJIaPpC6wTO1fhW5NuoO4izBIpzNVtcHyauvE2A==
X-Received: by 10.202.235.9 with SMTP id j9mr2516333oih.103.1473368594014; Thu, 08 Sep 2016 14:03:14 -0700 (PDT)
Received: from [172.19.131.158] ([12.130.117.42]) by smtp.gmail.com with ESMTPSA id g12sm232173iog.33.2016.09.08.14.02.58 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 08 Sep 2016 14:03:10 -0700 (PDT)
Content-Type: multipart/mixed; boundary="Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com>
Date: Thu, 8 Sep 2016 14:02:54 -0700
Message-Id: <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/SLaDIR34_kU3AKihiCByxg0_SpE>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2016 21:03:23 -0000

--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

> Document: draft-ietf-lisp-lcaf-14.txt
> Reviewer: Stig Venaas
> Review Date: 2016-09-07
> IETF LC End Date:
> Intended Status: Experimental

Thanks Stig for your comments. See responses below. As well as a new =
version -15 not submitted yet but for your quick review. Also find a =
lcaf-rfcdiff.html file for easy diff viewing.

> Summary:
> I have some minor concerns about this document that I think should be
> resolved before publication.
>=20
> The draft is almost ready but there are several places where the text
> is a bit unclear,

No problem. This document has had a long history and many opinions =
related to it has come and gone but we tried to reflect everyone=E2=80=99s=
 point of view.

> In section 1 I find this sentence a bit misleading since [AFI] doesn't
> talk about the formatting.
>=20
>   Currently defined AFIs include IPv4 and IPv6 addresses, which are
>   formatted according to code-points assigned in [AFI] as follows:
>=20
> Is the formatting shown here for AFI 1 and 2 defined in another
> document? It would be good to have a reference. If it is introduced
> in this document, then it should not be in the introduction.

No it is not shown in any document. All the AFI document says is that a =
16-bit AFI value of 1 means an IP address follows. That means 4 bytes of =
address. And 16 for IPv6 when AFI is 2.

As you can see the reference to the AFI document is at the end of the =
sentence.

> In section 2, first paragraph it says:
>   There is an address family currently defined for IPv4 or IPv6
>   addresses.
>=20
> It would be better to say that address families are defined for IPv4
> and IPv6 addresses.

Changed.

> In section 3 we have this paragraph:
>=20
>   The Address Family AFI definitions from [AFI] only allocate code-
>   points for the AFI value itself.  The length of the address or =
entity
>   that follows is not defined and is implied based on conventional
>   experience.  Where the LISP protocol uses LISP Canonical Addresses
>   specifically, the address length definitions will be in this
>   specification and take precedent over any other specification.
>=20
> I'm not sure what conventional experience means. Please try to find a

Well like I said above, the AFI values defined in the AFI document are =
just type values and there is no length defined. So =E2=80=9Cconventional =
wisdom=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we =
know what follows is 4 bytes. Ditto for IPv6, MAC addresses, etc.

> better way to say it. Regarding the last sentence, what if a you want
> to define new LCAF encodings in the future? Is it good to say that =
this
> specification takes precedent over any other?

LCAF encodings and definitions do not change the length of an AFI =
encoded address. So I am not sure what you mean.

> In section 3 we have this paragraph:
>=20
>   Length:  this 16-bit field is in units of bytes and covers all of =
the
>      LISP Canonical Address payload, starting and including the byte
>      after the Length field.  So any LCAF encoded address will have a
>      minimum length of 8 bytes when the Length field is 0.  The 8 =
bytes
>      include the AFI, Flags, Type, Reserved, and Length fields.  When
>      the AFI is not next to encoded address in a control message, then
>      the encoded address will have a minimum length of 6 bytes when =
the
>      Length field is 0.  The 6 bytes include the Flags, Type, =
Reserved,
>      and Length fields.
>=20
> Can you phrase this differently? First it says that any LCAF encoded

No not really. It is precise up to the sentence =E2=80=9CWhen the AFI is =
not ..=E2=80=9D.=20

> address has a minimum length of 8, but then it goes on to say how it
> sometimes is only 6. I understand what you're trying to say, but there=20=

> may be a better way of stating it.

This special case is for some LISP control-messages where the AFI is =
another place in the message but the address is somewhere else. Rather =
than have the AFI appear twice, the LCAF length needs to be different.

The length field always includes the entire contiguous set of LCAF bytes =
including type, flags, length field, etc.

The language is precise and accurate. Let me know how you think stating =
what I did in this comment response can be put in without writing a lot =
of text about a special case.

> In section 3 it says:
>=20
>   Rsvd2:  this 8-bit field is reserved for future use and MUST be
>      transmitted as 0 and ignored on receipt.
>=20
> Some of the LCAFs specified in this document are using it though. =
Hence
> you may need to change this text, and maybe not make it reserved.

I change to say the field is LCAF Type dependent and check the LCAF Type =
definition to see what bits of this field is not reserved.

> The last sentence of section 3 is:
>=20
>   Therefore, when a locator-set has a mix of AFI records and
>   LCAF records, all LCAF records will appear after all the AFI =
records.
>=20
> This is not necessarily true. Isn't it possible that one at some point
> in the future might use other AFI records that have AFI > 16387? IANA
> has assigned several values beyond 16387.

I will change to order must be in AFI value order.

> In 4.1 it says:
>   AFI =3D x:  x can be any AFI value from [AFI].
>=20
> Is 16387 always or sometimes allowed? Might be good to clarify that.
> This also applies
> to all the other LCAF types with similar language.

Always. And since 16387 is in [AFI] and the sentence above says =E2=80=9Cc=
an be any AFI value from [AFI]=E2=80=9D that implies it can be an LCAF =
AFI. If I said =E2=80=9Cincluding the LCAF AFI, I would have to make =
this change in a dozen places and would be repetitive.

> Section 4.4:
>=20
>   RTR RLOC Address:  this is an encapsulation address used by an ITR =
or
>      PITR which resides behind a NAT device.  This address is known to
>      have state in a NAT device so packets can flow from it to the =
LISP
>      ETR behind the NAT.  There can be one or more NAT Tunnel Router
>      (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in =
these
>      set of fields.  The number of NTRs encoded is determined by the
>      LCAF length field.  When there are no NTRs supplied, the NTR
>      fields can be omitted and reflected by the LCAF length field or =
an
>      AFI of 0 can be used to indicate zero NTRs encoded.
>=20
> It is not quite clear to me if the NTR fields here are the RTR RLOC

> addresses. Does no NTR fields mean that there are no RTR RLOC =
addresses?
> If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
> 0), and that would have AFI 0?

Good catch. NTR was an old term and the NAT-traversal draft now uses the =
term RTR. I will fix.

> Section 4.5 first paragraph:
>=20
>   Multicast group information can be published in the mapping =
database.
>   So a lookup on an group address EID can return a replication list of
>   RLOC group addresses or RLOC unicast addresses.
>=20
> Can you have a mix of group addresses and unicast addresses? It's also

Yes, it just depends what address you put following the AFI value.

> not so clear from the format what source prefixes are. Are the source

I will state that when an (S,G) is encoded that is what the source =
address field is used for.

> prefixes the same as the unicast RLOCs mentioned above? Can you have
> both multiple source addresses and then multiple group addresses? Can
> they be in arbitrarty order, or all sources followed by all groups?

As shown it is not a list. And if the AFI=3D0 precedes the Source/Subnet =
Address field it means there is no source address encoded.

> It seems one will need to inspect the address itself to tell whether =
it
> is a unicast or multicast address. This is probably fine.

Right.

> Section 4.6
> Add description of Rsvd3.
>=20
> Section 4.7
> Add description of Rsvd3 and Rsvd4.

Changed.

> Section 4.10
> In this section there are several examples of using the AFI List Type,
> but I miss a general definition. It appears that there can be a =
variable
> number of AFIs in the list. Any number > 0? It might be useful to have

Yes, a variable number.=20

> a length field associated with each AFI, or is it OK that parsing =
fails if
> an AFI is unknown, so that the address length is not known?

Well each AFI has an implicit length per address entry and the LCAF Type =
length has the total length. So why would we need to have yet another =
length and complicate parsing even more? Please be aware (and I=E2=80=99m =
sure you are being a senior coder), that the more fields you add to =
parse, the more cross-checking of field semantics and lengths have to be =
done. This really complicates the code and if part of the LCAF Type is =
parseable and others are not, then you have a question about what you =
use and what you discard.

> Section 4.10.3
> Isn't it unusual to include the 0 termination? Since you know the
> length it is not really needed. When parsing one will need to check
> the length either way, what should one do it the string accidentally
> is not 0-terminated?

Well the AFI definition in [AFI] doesn=E2=80=99t say how to terminate =
the string. But the length field will imply it. However, I wrote the =
=E2=80=9Cdistinguished-name=E2=80=9D draft to specify when AFI=3D17 is =
used (not only in a LCAF but by itself), how to terminate the string. I =
could include that reference, but that draft is not a working group =
document.

So please advise.

> Section 4.10.4
> I'm assuming that the recursion is more generic than this example?

Yes.

> It might be worth trying to explain the more generic concept and
> format, and make sure that this is described as just an example.

I think that can raise too many combinations. It will be hard to explain =
why someone will want to recurse a lot unless we have a well defined =
use-case. The fact that an LCAF has an AFI value. It means that an LCAF =
can be encoded wherever an AFI value is allowed.

This section shows a practical example and not a general one that no one =
would know how to use.

> Section 4.10.5
> This also appears to be just an example.

But a useful one that is already implemented in cisco code.

> Section 5.2
>   Key Field Num:  the number of fields (minus 1) the key can be broken
>      up into.  The width of the fields are fixed length.  So for a key
>      size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
>      bytes in length.  Allowing for a reasonable number of 16 field
>      separators, valid values range from 0 to 15.
>=20
> It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
> 5 fields?

I fixed the description to be more clear.

>   Key Wildcard Fields:  describes which fields in the key are not used
>      as part of the key lookup.  This wildcard encoding is a bitfield.
>      Each bit is a don't-care bit for a corresponding field in the =
key.
>      Bit 0 (the low-order bit) in this bitfield corresponds the first
>      field, right-justified in the key, bit 1 the second field, and so
>      on.  When a bit is set in the bitfield it is a don't-care bit and
>=20
> What does right-justified mean? Does it mean that the first field is =
the
> "low order" one? Basically at the end of the message? And the highest

Yes, I will make that more clear.

> order bit corresponds to the part of the key right after the wilcards?
> I think this need to be explained better to ensure interoperability.
>=20
>   Key:  the variable length key used to do a LISP Database Mapping
>      lookup.  The length of the key is the value n (shown above) minus
>      3.
>=20
> Isn't it exactly the value n, since the length is n + 3?

Yes, you are right. Fixed.

> Section 5.4
>   Length value n:  length in bytes of fields that follow.
> This is a bit confusing. I think 2+n is the length in bytes that =
follow
> the lenght field. While n is the number of bytes after the JSON =
length.

The 2 is for the JSON length field, since it is a fixed field. The =
=E2=80=9Cn=E2=80=9D is for the remaining variable length fields which =
include the JSON-binary-text and the AFI address. I=E2=80=99ll make the =
Length description reflect this. Thanks.

> Section 5.5
>=20
> It says "AFI =3D x" twice in the diagram. Based on this and the way it
> is described it might seem that the two AFI values must be the same
> value x, but they can differ, right? I this applies to several other
> messages types as well.

I=E2=80=99ll change x to y in the second occurence and a description for =
each.

> Section 7
> It looks like the table in the IANA considerations doesn't include all
> the types defined in this document.

That was done intentionally. The ones that are experimental are not in =
this section 7 list because there is no use-case document for it yet. =
Maybe the chairs can explain this better than me.

> I'm happy to discuss my comments if needed, and also review any
> updates to this draft.
>=20
> Stig

Let me know about the response where I didn=E2=80=99t make any changes.

Thanks again,
Dino/Dave/Job


--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9
Content-Disposition: attachment;
	filename=draft-ietf-lisp-lcaf-15.txt
Content-Type: text/plain;
	name="draft-ietf-lisp-lcaf-15.txt"
Content-Transfer-Encoding: quoted-printable





Network Working Group                                       D. Farinacci
Internet-Draft                                               lispers.net
Intended status: Experimental                                   D. Meyer
Expires: March 12, 2017                                          Brocade
                                                             J. Snijders
                                                      NTT Communications
                                                       September 8, 2016


                  LISP Canonical Address Format (LCAF)
                        draft-ietf-lisp-lcaf-15

Abstract

   This draft defines a canonical address format encoding used in LISP
   control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on March 12, 2017.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Farinacci, et al.        Expires March 12, 2017                 [Page 1]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Definition of Terms . . . . . . . . . . . . . . . . . . . . .   4
   3.  LISP Canonical Address Format Encodings . . . . . . . . . . .   5
   4.  LISP Canonical Address Applications . . . . . . . . . . . . .   7
     4.1.  Segmentation using LISP . . . . . . . . . . . . . . . . .   7
     4.2.  Carrying AS Numbers in the Mapping Database . . . . . . .   9
     4.3.  Assigning Geo Coordinates to Locator Addresses  . . . . .  10
     4.4.  NAT Traversal Scenarios . . . . . . . . . . . . . . . . .  12
     4.5.  Multicast Group Membership Information  . . . . . . . . .  14
     4.6.  Traffic Engineering using Re-encapsulating Tunnels  . . .  16
     4.7.  Storing Security Data in the Mapping Database . . . . . .  17
     4.8.  Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  19
     4.9.  Replication List Entries for Multicast Forwarding . . . .  21
     4.10. Applications for AFI List Type  . . . . . . . . . . . . .  22
       4.10.1.  Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  22
       4.10.2.  Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  23
       4.10.3.  ASCII Names in the Mapping Database  . . . . . . . .  24
       4.10.4.  Using Recursive LISP Canonical Address Encodings . .  25
       4.10.5.  Compatibility Mode Use Case  . . . . . . . . . . . .  26
   5.  Experimental LISP Canonical Address Applications  . . . . . .  27
     5.1.  Convey Application Specific Data  . . . . . . . . . . . .  27
     5.2.  Generic Database Mapping Lookups  . . . . . . . . . . . .  28
     5.3.  PETR Admission Control Functionality  . . . . . . . . . .  30
     5.4.  Data Model Encoding . . . . . . . . . . . . . . . . . . .  31
     5.5.  Encoding Key/Value Address Pairs  . . . . . . . . . . . .  32
     5.6.  Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  33
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  36
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  36
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  37
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  37
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  38
   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  39
   Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  40
     B.1.  Changes to draft-ietf-lisp-lcaf-15.txt  . . . . . . . . .  40
     B.2.  Changes to draft-ietf-lisp-lcaf-14.txt  . . . . . . . . .  40
     B.3.  Changes to draft-ietf-lisp-lcaf-13.txt  . . . . . . . . .  40
     B.4.  Changes to draft-ietf-lisp-lcaf-12.txt  . . . . . . . . .  40
     B.5.  Changes to draft-ietf-lisp-lcaf-11.txt  . . . . . . . . .  40



Farinacci, et al.        Expires March 12, 2017                 [Page 2]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


     B.6.  Changes to draft-ietf-lisp-lcaf-10.txt  . . . . . . . . .  41
     B.7.  Changes to draft-ietf-lisp-lcaf-09.txt  . . . . . . . . .  41
     B.8.  Changes to draft-ietf-lisp-lcaf-08.txt  . . . . . . . . .  41
     B.9.  Changes to draft-ietf-lisp-lcaf-07.txt  . . . . . . . . .  41
     B.10. Changes to draft-ietf-lisp-lcaf-06.txt  . . . . . . . . .  41
     B.11. Changes to draft-ietf-lisp-lcaf-05.txt  . . . . . . . . .  41
     B.12. Changes to draft-ietf-lisp-lcaf-04.txt  . . . . . . . . .  42
     B.13. Changes to draft-ietf-lisp-lcaf-03.txt  . . . . . . . . .  42
     B.14. Changes to draft-ietf-lisp-lcaf-02.txt  . . . . . . . . .  42
     B.15. Changes to draft-ietf-lisp-lcaf-01.txt  . . . . . . . . .  42
     B.16. Changes to draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  42
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  43

1.  Introduction

   The LISP architecture and protocols [RFC6830] introduces two new
   numbering spaces, Endpoint Identifiers (EIDs) and Routing Locators
   (RLOCs).  To provide flexibility for current and future applications,
   these values can be encoded in LISP control messages using a general
   syntax that includes Address Family Identifier (AFI), length, and
   value fields.

   Currently defined AFIs include IPv4 and IPv6 addresses, which are
   formatted according to code-points assigned in [AFI] as follows:

   IPv4 Encoded Address:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

















Farinacci, et al.        Expires March 12, 2017                 [Page 3]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   IPv6 Encoded Address:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 2            |       IPv6 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv6 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   This document describes the currently-defined AFIs the LISP protocol
   uses along with their encodings and introduces the LISP Canonical
   Address Format (LCAF) that can be used to define the LISP-specific
   encodings for arbitrary AFI values.

2.  Definition of Terms

   Address Family Identifier (AFI):  a term used to describe an address
      encoding in a packet.  Address families are defined for IPv4 and
      IPv6.  See [AFI] and [RFC3232] for details.  The reserved AFI
      value of 0 is used in this specification to indicate an
      unspecified encoded address where the length of the address is 0
      bytes following the 16-bit AFI value of 0.

   Unspecified Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 0            |    <nothing follows AFI=3D0>    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Endpoint ID (EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value
      used in the source and destination address fields of the first
      (most inner) LISP header of a packet.  The host obtains a
      destination EID the same way it obtains a destination address
      today, for example through a DNS lookup or SIP exchange.  The
      source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.




Farinacci, et al.        Expires March 12, 2017                 [Page 4]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Routing Locator (RLOC):   the IPv4 or IPv6 address of an egress
      tunnel router (ETR).  It is the output of a EID-to-RLOC mapping
      lookup.  An EID maps to one or more RLOCs.  Typically, RLOCs are
      numbered from topologically aggregatable blocks that are assigned
      to a site at each point to which it attaches to the global
      Internet; where the topology is defined by the connectivity of
      provider networks, RLOCs can be thought of as PA addresses.
      Multiple RLOCs can be assigned to the same ETR device or to
      multiple ETR devices at a site.

3.  LISP Canonical Address Format Encodings

   IANA has assigned AFI value 16387 (0x4003) to the LISP architecture
   and protocols.  This specification defines the encoding format of the
   LISP Canonical Address (LCA).  This section defines all types for
   which an initial allocation in the LISP-LCAF registry is requested.
   See IANA Considerations section for the complete list of such types.

   The Address Family AFI definitions from [AFI] only allocate code-
   points for the AFI value itself.  The length of the address or entity
   that follows is not defined and is implied based on conventional
   experience.  Where the LISP protocol uses LISP Canonical Addresses
   specifically, the address length definitions will be in this
   specification and take precedent over any other specification.

   The first 6 bytes of an LISP Canonical Address are followed by a
   variable number of fields of variable length:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Type       |     Rsvd2     |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Rsvd1:  this 8-bit field is reserved for future use and MUST be
      transmitted as 0 and ignored on receipt.

   Flags:  this 8-bit field is for future definition and use.  For now,
      set to zero on transmission and ignored on receipt.

   Type:  this 8-bit field is specific to the LISP Canonical Address
      formatted encodings, currently allocated values are:

     Type 0:  Null Body Type

     Type 1:  AFI List Type



Farinacci, et al.        Expires March 12, 2017                 [Page 5]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


     Type 2:  Instance ID Type

     Type 3:  AS Number Type

     Type 4:  Application Data Type

     Type 5:  Geo Coordinates Type

     Type 6:  Opaque Key Type

     Type 7:  NAT-Traversal Type

     Type 8:  Nonce Locator Type

     Type 9:  Multicast Info Type

     Type 10:  Explicit Locator Path Type

     Type 11:  Security Key Type

     Type 12:  Source/Dest Key Type

     Type 13:  Replication List Entry Type

     Type 14:  JSON Data Model Type

     Type 15:  Key/Value Address Pair Type

     Type 16:  Encapsulation Format Type

   Rsvd2:  this LCAF Type dependent 8-bit field is reserved for future
      use and MUST be transmitted as 0 and ignored on receipt.  See
      specific LCAF Type for specific bits not reserved.

   Length:  this 16-bit field is in units of bytes and covers all of the
      LISP Canonical Address payload, starting and including the byte
      after the Length field.  So any LCAF encoded address will have a
      minimum length of 8 bytes when the Length field is 0.  The 8 bytes
      include the AFI, Flags, Type, Reserved, and Length fields.  When
      the AFI is not next to encoded address in a control message, then
      the encoded address will have a minimum length of 6 bytes when the
      Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
      and Length fields.

   [RFC6830] states RLOC records are sorted when encoded in control
   messages so the locator-set has consistent order across all xTRs for
   a given EID.  The sort order is based on sort-key {afi, RLOC-
   address}. When an RLOC is LCAF encoded, the sort-key is {afi, LCAF-



Farinacci, et al.        Expires March 12, 2017                 [Page 6]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Type}. Therefore, when a locator-set has a mix of AFI records and
   LCAF records, they are ordered from smallest to largest AFI value.































4.  LISP Canonical Address Applications

4.1.  Segmentation using LISP

   When multiple organizations inside of a LISP site are using private
   addresses [RFC1918] as EID-prefixes, their address spaces must remain
   segregated due to possible address duplication.  An Instance ID in
   the address encoding can aid in making the entire AFI based address
   unique.

   Another use for the Instance ID LISP Canonical Address Format is when
   creating multiple segmented VPNs inside of a LISP site where keeping
   EID-prefix based subnets is desirable.





Farinacci, et al.        Expires March 12, 2017                 [Page 7]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Instance ID LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 2    | IID mask-len  |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Instance ID                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   IID mask-len:  if the AFI is set to 0, then this format is not
      encoding an extended EID-prefix but rather an instance-ID range
      where the 'IID mask-len' indicates the number of high-order bits
      used in the Instance ID field for the range.

   Length value n:  length in bytes of the AFI address that follows the
      Instance ID field including the AFI field itself.

   Instance ID:  the low-order 24-bits that can go into a LISP data
      header when the I-bit is set.  See [RFC6830] for details.  The
      reason for the length difference is so that the maximum number of
      instances supported per mapping system is 2^32 while conserving
      space in the LISP data header.  This comes at the expense of
      limiting the maximum number of instances per xTR to 2^24.  If an
      xTR is configured with multiple instance-IDs where the value in
      the high-order 8 bits are the same, then the low-order 24 bits
      MUST be unique.

   AFI =3D x:  x can be any AFI value from [AFI].

   This LISP Canonical Address Type can be used to encode either EID or
   RLOC addresses.

   Usage: When used as a lookup key, the EID is regarded as a extended-
   EID in the mapping system.  This encoding is used in EID records in
   Map-Requests, Map-Replies, Map-Registers, and Map-Notify messages.
   When LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system
   mechanism, extended EIDs are used in Map-Referral messages.









Farinacci, et al.        Expires March 12, 2017                 [Page 8]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.2.  Carrying AS Numbers in the Mapping Database

   When an AS number is stored in the LISP Mapping Database System for
   either policy or documentation reasons, it can be encoded in a LISP
   Canonical Address.

   AS Number LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 3    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           AS Number                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      AS Number field including the AFI field itself.

   AS Number:  the 32-bit AS number of the autonomous system that has
      been assigned either the EID or RLOC that follows.

   AFI =3D x:  x can be any AFI value from [AFI].

   The AS Number Canonical Address Type can be used to encode either EID
   or RLOC addresses.  The former is used to describe the LISP-ALT AS
   number the EID-prefix for the site is being carried for.  The latter
   is used to describe the AS that is carrying RLOC based prefixes in
   the underlying routing system.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.













Farinacci, et al.        Expires March 12, 2017                 [Page 9]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.3.  Assigning Geo Coordinates to Locator Addresses

   If an ETR desires to send a Map-Reply describing the Geo Coordinates
   for each locator in its locator-set, it can use the Geo Coordinate
   Type to convey physical location information.

   Coordinates are specified using the WGS-84 (World Geodetic System)
   reference coordinate system [WGS-84].

   Geo Coordinate LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 5    |     Rsvd2     |            12 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |N|     Latitude Degrees        |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |E|     Longitude Degrees       |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                            Altitude                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      8-byte Longitude and Latitude fields including the AFI field
      itself.

   N: When set to 1 means North, otherwise South.

   Latitude Degrees:  Valid values range from 0 to 90 degrees above or
      below the equator (northern or southern hemisphere, respectively).

   Latitude Minutes:  Valid values range from 0 to 59.

   Latitude Seconds:  Valid values range from 0 to 59.

   E: When set to 1 means East, otherwise West.

   Longitude Degrees:  Value values are from 0 to 180 degrees right or
      left of the Prime Meridian.

   Longitude Minutes:  Valid values range from 0 to 59.

   Longitude Seconds:  Valid values range from 0 to 59.



Farinacci, et al.        Expires March 12, 2017                [Page 10]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Altitude:  Height relative to sea level in meters.  This is a signed
      integer meaning that the altitude could be below sea level.  A
      value of 0x7fffffff indicates no Altitude value is encoded.

   AFI =3D x:  x can be any AFI value from [AFI].

   The Geo Coordinates Canonical Address Type can be used to encode
   either EID or RLOC addresses.  When used for EID encodings, you can
   determine the physical location of an EID along with the topological
   location by observing the locator-set.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.




































Farinacci, et al.        Expires March 12, 2017                [Page 11]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.4.  NAT Traversal Scenarios

   When a LISP system is conveying global address and mapped port
   information when traversing through a NAT device, the NAT-Traversal
   LCAF Type is used.  See [I-D.ermagan-lisp-nat-traversal] for details.

   NAT-Traversal Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 7    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       MS UDP Port Number      |      ETR UDP Port Number      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |  Global ETR RLOC Address  ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       MS RLOC Address  ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          | Private ETR RLOC Address  ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |      RTR RLOC Address 1 ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |      RTR RLOC Address k ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI addresses that follows
      the UDP Port Number field including the AFI fields themselves.

   MS UDP Port Number:  this is the UDP port number of the Map-Server
      and is set to 4342.

   ETR UDP Port Number:  this is the port number returned to a LISP
      system which was copied from the source port from a packet that
      has flowed through a NAT device.

   AFI =3D x:  x can be any AFI value from [AFI].

   Global ETR RLOC Address:  this is an address known to be globally
      unique built by NAT-traversal functionality in a LISP router.

   MS RLOC Address:  this is the address of the Map-Server used in the
      destination RLOC of a packet that has flowed through a NAT device.






Farinacci, et al.        Expires March 12, 2017                [Page 12]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Private ETR RLOC Address:  this is an address known to be a private
      address inserted in this LCAF format by a LISP router that resides
      on the private side of a NAT device.

   RTR RLOC Address:  this is an encapsulation address used by an ITR or
      PITR which resides behind a NAT device.  This address is known to
      have state in a NAT device so packets can flow from it to the LISP
      ETR behind the NAT.  There can be one or more NAT Reencapsulating
      Tunnel Router (RTR) [I-D.ermagan-lisp-nat-traversal] addresses
      supplied in these set of fields.  The number of RTRs encoded is
      determined by the LCAF length field.  When there are no RTRs
      supplied, the RTR fields can be omitted and reflected by the LCAF
      length field or an AFI of 0 can be used to indicate zero RTRs
      encoded.

   Usage: This encoding can be used in Info-Request and Info-Reply
   messages.  The mapping system does not store this information.  The
   information is used by an xTR and Map-Server to convey private and
   public address information when traversing NAT and firewall devices.
































Farinacci, et al.        Expires March 12, 2017                [Page 13]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.5.  Multicast Group Membership Information

   Multicast group information can be published in the mapping database.
   So a lookup on an group address EID can return a replication list of
   RLOC group addresses or RLOC unicast addresses.  The intent of this
   type of unicast replication is to deliver packets to multiple ETRs at
   receiver LISP multicast sites.  The locator-set encoding for this EID
   record type can be a list of ETRs when they each register with "Merge
   Semantics".  The encoding can be a typical AFI encoded locator
   address.  When an RTR list is being registered (with multiple levels
   according to [I-D.coras-lisp-re]), the Replication List Entry LCAF
   type is used for locator encoding.

   This LCAF encoding can be used to send broadcast packets to all
   members of a subnet when each EIDs are away from their home subnet
   location.

   Multicast Info Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 9    |     Rsvd2     |             8 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Instance-ID                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            Reserved           | Source MaskLen| Group MaskLen |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |   Source/Subnet Address  ...  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Group Address  ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Reserved:  must be set to zero and ignore on receipt.

   Instance ID:  the low-order 24-bits that can go into a LISP data
      header when the I-bit is set.  See [RFC6830] for details.  The use
      of the Instance-ID in this LCAF type is to associate a multicast
      forwarding entry for a given VPN.  The instance-ID describes the
      VPN and is registered to the mapping database system as a 3-tuple
      of (Instance-ID, S-prefix, G-prefix).

   Source MaskLen:  the mask length of the source prefix that follows.




Farinacci, et al.        Expires March 12, 2017                [Page 14]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Group MaskLen:  the mask length of the group prefix that follows.

   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Source/Subnet Address  is the source address or prefix for encoding a
      (S,G) multicast entry.

   Group Address  is the group address or group prefix for encoding
      (S,G) or (*,G) multicast entries.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended
   EIDs are used in Map-Referral messages.



































Farinacci, et al.        Expires March 12, 2017                [Page 15]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.6.  Traffic Engineering using Re-encapsulating Tunnels

   For a given EID lookup into the mapping database, this LCAF format
   can be returned to provide a list of locators in an explicit re-
   encapsulation path.  See [I-D.farinacci-lisp-te] for details.

   Explicit Locator Path (ELP) Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 10   |     Rsvd2     |               n               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Rsvd3         |L|P|S|           AFI =3D x             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Reencap Hop 1  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Rsvd3         |L|P|S|           AFI =3D x             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Reencap Hop k  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd3:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   Lookup bit (L):  this is the Lookup bit used to indicate to the user
      of the ELP to not use this address for encapsulation but to look
      it up in the mapping database system to obtain an encapsulating
      RLOC address.

   RLOC-Probe bit (P):  this is the RLOC-probe bit which means the
      Reencap Hop allows RLOC-probe messages to be sent to it.  When the
      R-bit is set to 0, RLOC-probes must not be sent.  When a Reencap
      Hop is an anycast address then multiple physical Reencap Hops are
      using the same RLOC address.  In this case, RLOC-probes are not
      needed because when the closest RLOC address is not reachable
      another RLOC address can be reachable.

   Strict bit (S):  this is the strict bit which means the associated
      Rencap Hop is required to be used.  If this bit is 0, the
      reencapsulator can skip this Reencap Hop and go to the next one in
      the list.





Farinacci, et al.        Expires March 12, 2017                [Page 16]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.  This encoding
   does not need to be understood by the mapping system for mapping
   database lookups since this LCAF type is not a lookup key.





















4.7.  Storing Security Data in the Mapping Database

   When a locator in a locator-set has a security key associated with
   it, this LCAF format will be used to encode key material.  See
   [I-D.ietf-lisp-ddt] for details.

















Farinacci, et al.        Expires March 12, 2017                [Page 17]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Security Key Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 11   |      Rsvd2    |             6 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Key Count   |      Rsvd3    | Key Algorithm |   Rsvd4     |R|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Key Length          |       Key Material ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        ... Key Material                       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Locator Address ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that start with the Key
      Material field.

   Key Count:  the Key Count field declares the number of Key sections
      included in this LCAF.

   Rsvd3:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   Key Algorithm:  the Algorithm field identifies the key's
      cryptographic algorithm and specifies the format of the Public Key
      field.

   Rsvd4:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   R bit:  this is the revoke bit and, if set, it specifies that this
      Key is being Revoked.

   Key Length:  this field determines the length in bytes of the Key
      Material field.

   Key Material:  the Key Material field stores the key material.  The
      format of the key material stored depends on the Key Algorithm
      field.

   AFI =3D x:  x can be any AFI value from [AFI].This is the locator
      address that owns the encoded security key.





Farinacci, et al.        Expires March 12, 2017                [Page 18]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.





















4.8.  Source/Destination 2-Tuple Lookups

   When both a source and destination address of a flow needs
   consideration for different locator-sets, this 2-tuple key is used in
   EID fields in LISP control messages.  When the Source/Dest key is
   registered to the mapping database, it can be encoded as a source-
   prefix and destination-prefix.  When the Source/Dest is used as a key
   for a mapping database lookup the source and destination come from a
   data packet.

















Farinacci, et al.        Expires March 12, 2017                [Page 19]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Source/Dest Key Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 12   |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            Reserved           |   Source-ML   |    Dest-ML    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Source-Prefix ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |     Destination-Prefix ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Reserved:  must be set to zero and ignore on receipt.

   Source-ML:  the mask length of the source prefix that follows.

   Dest-ML:  the mask length of the destination prefix that follows.

   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended
   EIDs are used in Map-Referral messages.  Refer to
   [I-D.farinacci-lisp-te] for usage details of this LCAF type.


















Farinacci, et al.        Expires March 12, 2017                [Page 20]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.9.  Replication List Entries for Multicast Forwarding

   The Replication List Entry LCAF type is an encoding for a locator
   being used for unicast replication according to the specification in
   [I-D.coras-lisp-re].  This locator encoding is pointed to by a
   Multicast Info LCAF Type and is registered by Re-encapsulating Tunnel
   Routers (RTRs) that are participating in an overlay distribution
   tree.  Each RTR will register its locator address and its configured
   level in the distribution tree.

   Replication List Entry Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 13   |    Rsvd2      |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              Rsvd3            |     Rsvd4     |  Level Value  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |           RTR/ETR #1 ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              Rsvd3            |     Rsvd4     |  Level Value  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |           RTR/ETR  #n ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd{1,2,3,4}:  must be set to zero and ignore on receipt.

   Level Value:  this value is associated with the level within the
      overlay distribution tree hierarchy where the RTR resides.  The
      level numbers are ordered from lowest value being close to the ITR
      (meaning that ITRs replicate to level-0 RTRs) and higher levels
      are further downstream on the distribution tree closer to ETRs of
      multicast receiver sites.

   AFI =3D x:  x can be any AFI value from [AFI].  A specific AFI has =
its
      own encoding of either a unicast or multicast locator address.
      For efficiency reasons, all RTR/ETR entries for the same level
      should be combined together by a Map-Server to avoid searching
      through the entire multi-level list of locator entries in a Map-
      Reply message.

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.



Farinacci, et al.        Expires March 12, 2017                [Page 21]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.  Applications for AFI List Type

4.10.1.  Binding IPv4 and IPv6 Addresses

   When header translation between IPv4 and IPv6 is desirable a LISP
   Canonical Address can use the AFI List Type to carry multiple AFIs in
   one LCAF AFI.

   Address Binding LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |         2 + 4 + 2 + 16        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |            AFI =3D 2            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          IPv6 Address ...                     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 24 when IPv4 and IPv6 AFI
      encoded addresses are used.

   This type of address format can be included in a Map-Request when the
   address is being used as an EID, but the Mapping Database System
   lookup destination can use only the IPv4 address.  This is so a
   Mapping Database Service Transport System, such as LISP-ALT
   [RFC6836], can use the Map-Request destination address to route the
   control message to the desired LISP site.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  See
   subsections in this section for specific use cases.








Farinacci, et al.        Expires March 12, 2017                [Page 22]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.2.  Layer-2 VPNs

   When MAC addresses are stored in the LISP Mapping Database System,
   the AFI List Type can be used to carry AFI 6.

   MAC Address LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             2 + 6             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             AFI =3D 6           |    Layer-2 MAC Address  ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    ... Layer-2 MAC Address                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 8 when MAC address AFI encoded
      addresses are used.

   This address format can be used to connect layer-2 domains together
   using LISP over an IPv4 or IPv6 core network to create a layer-2 VPN.
   In this use-case, a MAC address is being used as an EID, and the
   locator-set that this EID maps to can be an IPv4 or IPv6 RLOCs, or
   even another MAC address being used as an RLOC.  See
   [I-D.portoles-lisp-eid-mobility] for how layer-2 VPNs operate when
   doing EID mobility.






















Farinacci, et al.        Expires March 12, 2017                [Page 23]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.3.  ASCII Names in the Mapping Database

   If DNS names or URIs are stored in the LISP Mapping Database System,
   the AFI List Type can be used to carry an ASCII string where it is
   delimited by length 'n' of the LCAF Length encoding.

   ASCII LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             2 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             AFI =3D 17          |      DNS Name or URI  ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes AFI=3D17 field and the =
null-terminated
      ASCII string (the last byte of 0 is included).































Farinacci, et al.        Expires March 12, 2017                [Page 24]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.4.  Using Recursive LISP Canonical Address Encodings

   When any combination of above is desirable, the AFI List Type value
   can be used to carry within the LCAF AFI another LCAF AFI (for
   example, Application Specific Data see Section 5.1.

   Recursive LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             8 + 18            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 4    |     Rsvd2     |            12 + 6             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   IP TOS, IPv6 QQS or Flow Label              |    Protocol   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Local Port (lower-range)   |    Local Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Remote Port (lower-range)   |   Remote Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 18 when an AFI=3D1 IPv4 address =
is
      included.

   This format could be used by a Mapping Database Transport System,
   such as LISP-ALT [RFC6836], where the AFI=3D1 IPv4 address is used as
   an EID and placed in the Map-Request destination address by the
   sending LISP system.  The ALT system can deliver the Map-Request to
   the LISP destination site independent of the Application Data Type
   AFI payload values.  When this AFI is processed by the destination
   LISP site, it can return different locator-sets based on the type of
   application or level of service that is being requested.










Farinacci, et al.        Expires March 12, 2017                [Page 25]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.5.  Compatibility Mode Use Case

   A LISP system should use the AFI List Type format when sending to
   LISP systems that do not support a particular LCAF Type used to
   encode locators.  This allows the receiving system to be able to
   parse a locator address for encapsulation purposes.  The list of AFIs
   in an AFI List LCAF Type has no semantic ordering and a receiver
   should parse each AFI element no matter what the ordering.

   Compatibility Mode Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |          8 + 14 + 6           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 5    |     Rsvd2     |            12 + 2             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |N|     Latitude Degrees        |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |E|     Longitude Degrees       |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                            Altitude                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D 0          |           AFI =3D 1             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          IPv4 Address                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   If a system does not recognized the Geo Coordinate LCAF Type that is
   accompanying a locator address, an encoder can include the Geo
   Coordinate LCAF Type embedded in a AFI List LCAF Type where the AFI
   in the Geo Coordinate LCAF is set to 0 and the AFI encoded next in
   the list is encoded with a valid AFI value to identify the locator
   address.

   A LISP system is required to support the AFI List LCAF Type to use
   this procedure.  It would skip over 10 bytes of the Geo Coordinate
   LCAF Type to get to the locator address encoding (an IPv4 locator
   address).  A LISP system that does support the Geo Coordinate LCAF
   Type can support parsing the locator address within the Geo
   Coordinate LCAF encoding or in the locator encoding that follows in
   the AFI List LCAF.




Farinacci, et al.        Expires March 12, 2017                [Page 26]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.  Experimental LISP Canonical Address Applications

5.1.  Convey Application Specific Data

   When a locator-set needs to be conveyed based on the type of
   application or the Per-Hop Behavior (PHB) of a packet, the
   Application Data Type can be used.

   Application Data LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 4    |     Rsvd2     |            12 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       IP TOS, IPv6 TC, or Flow Label          |    Protocol   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Local Port (lower-range)   |    Local Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Remote Port (lower-range)   |   Remote Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      8-byte Application Data fields including the AFI field itself.

   IP TOS, IPv6 TC, or Flow Label:  this field stores the 8-bit IPv4 TOS
      field used in an IPv4 header, the 8-bit IPv6 Traffic Class or Flow
      Label used in an IPv6 header.

   Local Port/Remote Port Ranges:  these fields are from the TCP, UDP,
      or SCTP transport header.  A range can be specified by using a
      lower value and an upper value.  When a single port is encoded,
      the lower and upper value fields are the same.

   AFI =3D x:  x can be any AFI value from [AFI].

   The Application Data Canonical Address Type is used for an EID
   encoding when an ITR wants a locator-set for a specific application.
   When used for an RLOC encoding, the ETR is supplying a locator-set
   for each specific application is has been configured to advertise.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended



Farinacci, et al.        Expires March 12, 2017                [Page 27]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   EIDs are used in Map-Referral messages.  This LCAF type is used as a
   lookup key to the mapping system that can return a longest-match or
   exact-match entry.





















5.2.  Generic Database Mapping Lookups

   When the LISP Mapping Database system holds information accessed by a
   generic formatted key (where the key is not the usual IPv4 or IPv6
   address), an opaque key may be desirable.

   Opaque Key LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 6    |     Rsvd2     |             3 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | Key Field Num |      Key Wildcard Fields      |   Key . . .   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       . . . Key                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the type's payload.  The value n
      is the number of bytes that follow this Length field.





Farinacci, et al.        Expires March 12, 2017                [Page 28]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Key Field Num:  the value of this field is the the number of "Key"
      sub-fields minus 1, the "Key" field can be broken up into.  So if
      this field has a value of 0, there is 1 sub-field in the "Key".
      The width of the sub-fields are fixed length.  So for a key size
      of 8 bytes, with a Key Field Num of 3, allows 4 sub-fields of 2
      bytes each in length.  Allowing for a reasonable number of 16 sub-
      field separators, valid values range from 0 to 15.

   Key Wildcard Fields:  describes which fields in the key are not used
      as part of the key lookup.  This wildcard encoding is a bitfield.
      Each bit is a don't-care bit for a corresponding field in the key.
      Bit 0 (the low-order bit) in this bitfield corresponds the first
      field, the low-order field in the key, bit 1 the second field, and
      so on.  When a bit is set in the bitfield it is a don't-care bit
      and should not be considered as part of the database lookup.  When
      the entire 16-bits is set to 0, then all bits of the key are used
      for the database lookup.

   Key:  the variable length key used to do a LISP Database Mapping
      lookup.  The length of the key is the value n (as shown above).

   Usage: This is an experimental type where the usage has not been
   defined yet.




























Farinacci, et al.        Expires March 12, 2017                [Page 29]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.3.  PETR Admission Control Functionality

   When a public PETR device wants to verify who is encapsulating to it,
   it can check for a specific nonce value in the LISP encapsulated
   packet.  To convey the nonce to admitted ITRs or PITRs, this LCAF
   format is used in a Map-Register or Map-Reply locator-record.

   Nonce Locator Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 8    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Reserved    |                  Nonce                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      Nonce field including the AFI field itself.

   Reserved:  must be set to zero and ignore on receipt.

   Nonce:  this is a nonce value returned by an ETR in a Map-Reply
      locator-record to be used by an ITR or PITR when encapsulating to
      the locator address encoded in the AFI field of this LCAF type.
      This nonce value is inserted in the nonce field in the LISP header
      encapsulation.

   AFI =3D x:  x can be any AFI value from [AFI].

   Usage: This is an experimental type where the usage has not been
   defined yet.















Farinacci, et al.        Expires March 12, 2017                [Page 30]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.4.  Data Model Encoding

   This type allows a JSON data model to be encoded either as an EID or
   RLOC.

   JSON Data Model Type Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 14   |    Rsvd2    |B|             2 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           JSON length         | JSON binary/text encoding ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Optional Address ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the fields that follow the "JSON
      length" field.

   Rsvd{1,2}:  must be set to zero and ignore on receipt.

   B bit:  indicates that the JSON field is binary encoded according to
      [JSON-BINARY] when the bit is set to 1.  Otherwise the encoding is
      based on text encoding according to [RFC7159].

   JSON length:  length in octets of the following 'JSON binary/text
      encoding' field.

   JSON binary/text encoding field:  a variable length field that
      contains either binary or text encodings.

   AFI =3D x:  x can be any AFI value from [AFI].  A specific AFI has =
its
      own encoding of either a unicast or multicast locator address.
      All RTR/ETR entries for the same level should be combined together
      by a Map-Server to avoid searching through the entire multi-level
      list of locator entries in a Map-Reply message.

   Usage: This is an experimental type where the usage has not been
   defined yet.









Farinacci, et al.        Expires March 12, 2017                [Page 31]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.5.  Encoding Key/Value Address Pairs

   The Key/Value pair is for example useful for attaching attributes to
   other elements of LISP packets, such as EIDs or RLOCs.  When
   attaching attributes to EIDs or RLOCs, it's necessary to distinguish
   between the element that should be used as EID or RLOC, and hence as
   key for lookups, and additional attributes.  This is especially the
   case when the difference cannot be determined from the types of the
   elements, such as when two IP addresses are being used.

   Key/Value Pair Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 15   |     Rsvd2     |               n               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Address as Key ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D y          |       Address as Value ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd{1,2}:  must be set to zero and ignore on receipt.

   AFI =3D x:  x is the "Address as Key" AFI that can have any value =
from
      [AFI].  A specific AFI has its own encoding of either a unicast or
      multicast locator address.  All RTR/ETR entries for the same level
      should be combined together by a Map-Server to avoid searching
      through the entire multi-level list of locator entries in a Map-
      Reply message.

   Address as Key:  this AFI encoded address will be attached with the
      attributes encoded in "Address as Value" which follows this field.

   AFI =3D y:  y is the "Address of Value" AFI that can have any value
      from [AFI].  A specific AFI has its own encoding of either a
      unicast or multicast locator address.  All RTR/ETR entries for the
      same level should be combined together by a Map-Server to avoid
      searching through the entire multi-level list of locator entries
      in a Map-Reply message.

   Address as Value:  this AFI encoded address will be the attribute
      address that goes along with "Address as Key" which precedes this
      field.



Farinacci, et al.        Expires March 12, 2017                [Page 32]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Usage: This is an experimental type where the usage has not been
   defined yet.































5.6.  Multiple Data-Planes

   Overlays are becoming popular in many parts of the network which have
   created an explosion of data-plane encapsulation headers.  Since the
   LISP mapping system can hold many types of address formats, it can
   represent the encapsulation format supported by an RLOC as well.
   When an encapsulator receives a Map-Reply with an Encapsulation
   Format LCAF Type encoded in an RLOC-record, it can select an
   encapsulation format, that it can support, from any of the
   encapsulation protocols which have the bit set to 1 in this LCAF
   type.







Farinacci, et al.        Expires March 12, 2017                [Page 33]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Encapsulation Format Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 16   |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |        Reserved-for-Future-Encapsulations       |U|G|N|v|V|l|L|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |          Address ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Rsvd1/Rsvd2:  must be set to zero and ignored on receipt.

   Length value n:  length in bytes of the AFI address that follows the
      next 32-bits including the AFI field itself.

   Reserved-for-Future-Encapsulations:  must be set to zero and ignored
      on receipt.  This field will get bits allocated to future
      encapsulations, as they are created.

   L: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept layer3 LISP encapsulation using destination UDP port
      4341 [RFC6830].

   l: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept layer2 LISP encapsulation using destination UDP port
      8472 [I-D.smith-lisp-layer2].

   V: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept VXLAN encapsulation using destination UDP port 4789
      [RFC7348].

   v: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept VXLAN-GPE encapsulation using destination UDP port 4790
      [I-D.quinn-vxlan-gpe].

   N: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept NV-GRE encapsulation using IPv4/ IPv6 protocol number
      47 [RFC7637].

   G: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept GENEVE encapsulation using destination UDP port 6081
      [I-D.gross-geneve].





Farinacci, et al.        Expires March 12, 2017                [Page 34]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   U: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept GUE encapsulation using destination UDP port TBD
      [I-D.herbert-gue].

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.













































Farinacci, et al.        Expires March 12, 2017                [Page 35]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


6.  Security Considerations

   There are no security considerations for this specification.  The
   security considerations are documented for the protocols that use
   LISP Canonical Addressing.

   The use of the Geo-Coordinates LCAF Type may raise physical privacy
   issues.  Care should be taken when configuring the mapping system to
   use specific policy parameters so geo-location information is not
   returned gratutiosly.

7.  IANA Considerations

   This document defines a canonical address format encoding used in
   LISP control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.  Such address format is based on a fixed AFI
   (16387) and a LISP LCAF Type field.

   The LISP LCAF Type field is an 8-bit field specific to the LISP
   Canonical Address formatted encodings, for which IANA is to create
   and maintain a new registry (as outlined in [RFC5226]) entitled "LISP
   LCAF Type".  Initial values for the LISP LCAF Type registry are given
   below.  Future assignments are to be made through expert review with
   a specification required publication.  Assignments consist of a LISP
   LCAF Type name and its associated value:

           +-------+------------------------------+------------+
           | Value | LISP LCAF Type Name          | Definition |
           +-------+------------------------------+------------+
           | 0     | Null Body Type               | Section 3  |
           | 1     | AFI List Type                | Section 3  |
           | 2     | Instance ID Type             | Section 3  |
           | 3     | AS Number Type               | Section 3  |
           | 5     | Geo Coordinates Type         | Section 3  |
           | 7     | NAT-Traversal Type           | Section 3  |
           | 9     | Multicast Info Type          | Section 3  |
           | 10    | Explicit Locator Path Type   | Section 3  |
           | 11    | Security Key Type            | Section 3  |
           | 12    | Source/Dest Key Type         | Section 3  |
           | 13    | Replication List Entry Type  | Section 3  |
           +-------+------------------------------+------------+

                  Table 1: LISP LCAF Type Initial Values








Farinacci, et al.        Expires March 12, 2017                [Page 36]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


8.  References

8.1.  Normative References

   [RFC1918]  Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.,
              and E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996,
              <http://www.rfc-editor.org/info/rfc1918>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC3232]  Reynolds, J., Ed., "Assigned Numbers: RFC 1700 is Replaced
              by an On-line Database", RFC 3232, DOI 10.17487/RFC3232,
              January 2002, <http://www.rfc-editor.org/info/rfc3232>.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              DOI 10.17487/RFC5226, May 2008,
              <http://www.rfc-editor.org/info/rfc5226>.

   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
              Locator/ID Separation Protocol (LISP)", RFC 6830,
              DOI 10.17487/RFC6830, January 2013,
              <http://www.rfc-editor.org/info/rfc6830>.

   [RFC6836]  Fuller, V., Farinacci, D., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol Alternative Logical
              Topology (LISP+ALT)", RFC 6836, DOI 10.17487/RFC6836,
              January 2013, <http://www.rfc-editor.org/info/rfc6836>.

   [RFC7159]  Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
              Interchange Format", RFC 7159, DOI 10.17487/RFC7159, March
              2014, <http://www.rfc-editor.org/info/rfc7159>.

   [RFC7348]  Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
              L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
              eXtensible Local Area Network (VXLAN): A Framework for
              Overlaying Virtualized Layer 2 Networks over Layer 3
              Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
              <http://www.rfc-editor.org/info/rfc7348>.

   [RFC7637]  Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network
              Virtualization Using Generic Routing Encapsulation",
              RFC 7637, DOI 10.17487/RFC7637, September 2015,
              <http://www.rfc-editor.org/info/rfc7637>.



Farinacci, et al.        Expires March 12, 2017                [Page 37]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


8.2.  Informative References

   [AFI]      IANA, , "Address Family Identifier (AFIs)", ADDRESS FAMILY
              NUMBERS http://www.iana.org/numbers.html, Febuary 2007.

   [I-D.coras-lisp-re]
              Coras, F., Cabellos-Aparicio, A., Domingo-Pascual, J.,
              Maino, F., and D. Farinacci, "LISP Replication
              Engineering", draft-coras-lisp-re-08 (work in progress),
              November 2015.

   [I-D.ermagan-lisp-nat-traversal]
              Ermagan, V., Farinacci, D., Lewis, D., Skriver, J., Maino,
              F., and C. White, "NAT traversal for LISP", draft-ermagan-
              lisp-nat-traversal-11 (work in progress), August 2016.

   [I-D.farinacci-lisp-te]
              Farinacci, D., Kowal, M., and P. Lahiri, "LISP Traffic
              Engineering Use-Cases", draft-farinacci-lisp-te-11 (work
              in progress), September 2016.

   [I-D.gross-geneve]
              Gross, J., Sridhar, T., Garg, P., Wright, C., Ganga, I.,
              Agarwal, P., Duda, K., Dutt, D., and J. Hudson, "Geneve:
              Generic Network Virtualization Encapsulation", draft-
              gross-geneve-02 (work in progress), October 2014.

   [I-D.herbert-gue]
              Herbert, T., Yong, L., and O. Zia, "Generic UDP
              Encapsulation", draft-herbert-gue-03 (work in progress),
              March 2015.

   [I-D.ietf-lisp-ddt]
              Fuller, V., Lewis, D., Ermagan, V., Jain, A., and A.
              Smirnov, "LISP Delegated Database Tree", draft-ietf-lisp-
              ddt-07 (work in progress), May 2016.

   [I-D.portoles-lisp-eid-mobility]
              Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino,
              F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a
              Unified Control Plane", draft-portoles-lisp-eid-
              mobility-00 (work in progress), April 2016.









Farinacci, et al.        Expires March 12, 2017                [Page 38]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   [I-D.quinn-vxlan-gpe]
              Quinn, P., Manur, R., Kreeger, L., Lewis, D., Maino, F.,
              Smith, M., Agarwal, P., Yong, L., Xu, X., Elzur, U., Garg,
              P., and D. Melman, "Generic Protocol Extension for VXLAN",
              draft-quinn-vxlan-gpe-04 (work in progress), February
              2015.

   [I-D.smith-lisp-layer2]
              Smith, M., Dutt, D., Farinacci, D., and F. Maino, "Layer 2
              (L2) LISP Encapsulation Format", draft-smith-lisp-
              layer2-03 (work in progress), September 2013.

   [JSON-BINARY]
              "Universal Binary JSON Specification",
              URL http://ubjson.org.

   [WGS-84]   Geodesy and Geophysics Department, DoD., "World Geodetic
              System 1984", NIMA TR8350.2, January 2000, <http://earth-
              info.nga.mil/GandG/publications/tr8350.2/wgs84fin.pdf>.

Appendix A.  Acknowledgments

   The authors would like to thank Vince Fuller, Gregg Schudel, Jesper
   Skriver, Luigi Iannone, Isidor Kouvelas, and Sander Steffann for
   their technical and editorial commentary.

   The authors would like to thank Victor Moreno for discussions that
   lead to the definition of the Multicast Info LCAF type.

   The authors would like to thank Parantap Lahiri and Michael Kowal for
   discussions that lead to the definition of the Explicit Locator Path
   (ELP) LCAF type.

   The authors would like to thank Fabio Maino and Vina Ermagan for
   discussions that lead to the definition of the Security Key LCAF
   type.

   The authors would like to thank Albert Cabellos-Aparicio and Florin
   Coras for discussions that lead to the definition of the Replication
   List Entry LCAF type.

   Thanks goes to Michiel Blokzijl and Alberto Rodriguez-Natal for
   suggesting new LCAF types.

   Thanks also goes to Terry Manderson for assistance obtaining a LISP
   AFI value from IANA.





Farinacci, et al.        Expires March 12, 2017                [Page 39]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


Appendix B.  Document Change Log

   [RFC Editor: Please delete this section on publication as RFC.]

B.1.  Changes to draft-ietf-lisp-lcaf-15.txt

   o  Submitted September 2016.

   o  Addressed comments from Routing Directorate reviewer Stig Venass.

B.2.  Changes to draft-ietf-lisp-lcaf-14.txt

   o  Submitted July 2016.

   o  Fix IDnits errors and comments from Luigi Iannone, document
      shepherd.

B.3.  Changes to draft-ietf-lisp-lcaf-13.txt

   o  Submitted May 2016.

   o  Explain the Instance-ID LCAF Type is 32-bits in length and the
      Instance-ID field in the LISP encapsulation header is 24-bits.

B.4.  Changes to draft-ietf-lisp-lcaf-12.txt

   o  Submitted March 2016.

   o  Updated references and document timer.

   o  Removed the R, J, and L bits from the Multicast Info Type LCAF
      since working group decided to not go forward with draft-
      farinacci-lisp-mr-signaling-03.txt in favor of draft- ietf-lisp-
      signal-free-00.txt.

B.5.  Changes to draft-ietf-lisp-lcaf-11.txt

   o  Submitted September 2015.

   o  Reflecting comments from Prague LISP working group.

   o  Readying document for a LISP LCAF registry, RFC publication, and
      for new use-cases that will be defined in the new charter.








Farinacci, et al.        Expires March 12, 2017                [Page 40]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


B.6.  Changes to draft-ietf-lisp-lcaf-10.txt

   o  Submitted June 2015.

   o  Fix coauthor Job's contact information.

B.7.  Changes to draft-ietf-lisp-lcaf-09.txt

   o  Submitted June 2015.

   o  Fix IANA Considerations section to request a registry to allocate
      and track LCAF Type values.

B.8.  Changes to draft-ietf-lisp-lcaf-08.txt

   o  Submitted April 2015.

   o  Comment from Florin.  The Application Data Type length field has a
      typo.  The field should be labeled "12 + n" and not "8 + n".

   o  Fix length fields in the sections titled "Using Recursive LISP
      Canonical Address Encodings", "Generic Database Mapping Lookups",
      and "Data Model Encoding".

B.9.  Changes to draft-ietf-lisp-lcaf-07.txt

   o  Submitted December 2014.

   o  Add a new LCAF Type called "Encapsulation Format" so decapsulating
      xTRs can inform encapsulating xTRs what data-plane encapsulations
      they support.

B.10.  Changes to draft-ietf-lisp-lcaf-06.txt

   o  Submitted October 2014.

   o  Make it clear how sorted RLOC records are done when LCAFs are used
      as the RLOC record.

B.11.  Changes to draft-ietf-lisp-lcaf-05.txt

   o  Submitted May 2014.

   o  Add a length field of the JSON payload that can be used for either
      binary or text encoding of JSON data.






Farinacci, et al.        Expires March 12, 2017                [Page 41]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


B.12.  Changes to draft-ietf-lisp-lcaf-04.txt

   o  Submitted January 2014.

   o  Agreement among ELP implementors to have the AFI 16-bit field
      adjacent to the address.  This will make the encoding consistent
      with all other LCAF type address encodings.

B.13.  Changes to draft-ietf-lisp-lcaf-03.txt

   o  Submitted September 2013.

   o  Updated references and author's affilations.

   o  Added Instance-ID to the Multicast Info Type so there is relative
      ease in parsing (S,G) entries within a VPN.

   o  Add port range encodings to the Application Data LCAF Type.

   o  Add a new JSON LCAF Type.

   o  Add Address Key/Value LCAF Type to allow attributes to be attached
      to an address.

B.14.  Changes to draft-ietf-lisp-lcaf-02.txt

   o  Submitted March 2013.

   o  Added new LCAF Type "Replication List Entry" to support LISP
      replication engineering use-cases.

   o  Changed references to new LISP RFCs.

B.15.  Changes to draft-ietf-lisp-lcaf-01.txt

   o  Submitted January 2013.

   o  Change longitude range from 0-90 to 0-180 in section 4.4.

   o  Added reference to WGS-84 in section 4.4.

B.16.  Changes to draft-ietf-lisp-lcaf-00.txt

   o  Posted first working group draft August 2012.

   o  This draft was renamed from draft-farinacci-lisp-lcaf-10.txt.





Farinacci, et al.        Expires March 12, 2017                [Page 42]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


Authors' Addresses

   Dino Farinacci
   lispers.net
   San Jose, CA
   USA

   Email: farinacci@gmail.com


   Dave Meyer
   Brocade
   San Jose, CA
   USA

   Email: dmm@1-4-5.net


   Job Snijders
   NTT Communications
   Theodorus Majofskistraat 100
   Amsterdam  1065 SZ
   NL

   Email: job@ntt.net


























Farinacci, et al.        Expires March 12, 2017                [Page 43]

--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii




--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9
Content-Disposition: attachment;
	filename=lcaf-rfcdiff.html
Content-Type: text/html;
	name="lcaf-rfcdiff.html"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" =
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- saved from url=3D(0030)https://tools.ietf.org/rfcdiff -->
<html xmlns=3D"http://www.w3.org/1999/xhtml"><head><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=20
  =20
  <meta http-equiv=3D"Content-Style-Type" content=3D"text/css">=20
  <title>Diff: draft-ietf-lisp-lcaf-14.txt - =
draft-ietf-lisp-lcaf-15.txt</title>=20
  <style type=3D"text/css">=20
    body    { margin: 0.4ex; margin-right: auto; }=20
    tr      { }=20
    td      { white-space: pre; font-family: monospace; vertical-align: =
top; font-size: 0.86em;}=20
    th      { font-size: 0.86em; }=20
    .small  { font-size: 0.6em; font-style: italic; font-family: =
Verdana, Helvetica, sans-serif; }=20
    .left   { background-color: #EEE; }=20
    .right  { background-color: #FFF; }=20
    .diff   { background-color: #CCF; }=20
    .lblock { background-color: #BFB; }=20
    .rblock { background-color: #FF8; }=20
    .insert { background-color: #8FF; }=20
    .delete { background-color: #ACF; }=20
    .void   { background-color: #FFB; }=20
    .cont   { background-color: #EEE; }=20
    .linebr { background-color: #AAA; }=20
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; =
text-align: right; padding: 0 2px; }=20
    .elipsis{ background-color: #AAA; }=20
    .left .cont { background-color: #DDD; }=20
    .right .cont { background-color: #EEE; }=20
    .lblock .cont { background-color: #9D9; }=20
    .rblock .cont { background-color: #DD6; }=20
    .insert .cont { background-color: #0DD; }=20
    .delete .cont { background-color: #8AD; }=20
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px =
0; }=20
    span.hide { display: none; color: #aaa;}    a:hover span { display: =
inline; }    tr.change { background-color: gray; }=20
    tr.change a { text-decoration: none; color: black }=20
  </style>=20
     <script>
var chunk_index =3D 0;
var old_chunk =3D null;

function format_chunk(index) {
    var prefix =3D "diff";
    var str =3D index.toString();
    for (x=3D0; x<(4-str.length); ++x) {
        prefix+=3D'0';
    }
    return prefix + str;
}

function find_chunk(n){
    return document.querySelector('tr[id$=3D"' + n + '"]');
}

function change_chunk(offset) {
    var index =3D chunk_index + offset;
    var new_str;
    var new_chunk;

    new_str =3D format_chunk(index);
    new_chunk =3D find_chunk(new_str);
    if (!new_chunk) {
        return;
    }
    if (old_chunk) {
        old_chunk.style.outline =3D "";
    }
    old_chunk =3D new_chunk;
    old_chunk.style.outline =3D "1px solid red";
    window.location.hash =3D "#" + new_str;
    window.scrollBy(0,-100);
    chunk_index =3D index;
}

document.onkeydown =3D function(e) {
    switch (e.keyCode) {
    case 78:
        change_chunk(1);
        break;
    case 80:
        change_chunk(-1);
        break;
    }
};
   </script>=20
</head>=20
<body>=20
  <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">=20
  <tbody><tr id=3D"part-1" bgcolor=3D"orange"><th></th><th><a =
href=3D"https://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-lisp-lcaf-14.txt"=
 style=3D"color:#008; text-decoration:none;">&lt;</a>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-lcaf-14.txt" =
style=3D"color:#008">draft-ietf-lisp-lcaf-14.txt</a>&nbsp;</th><th> =
</th><th>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-lcaf-15.txt" =
style=3D"color:#008">draft-ietf-lisp-lcaf-15.txt</a>&nbsp;<a =
href=3D"https://tools.ietf.org/rfcdiff?url1=3Ddraft-ietf-lisp-lcaf-15.txt"=
 style=3D"color:#008; text-decoration:none;">&gt;</a></th><th></th></tr>=20=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Network Working =
Group                                       D. Farinacci</td><td> =
</td><td class=3D"right">Network Working Group                           =
            D. Farinacci</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Internet-Draft    =
                                           lispers.net</td><td> </td><td =
class=3D"right">Internet-Draft                                           =
    lispers.net</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Intended status: =
Experimental                                   D. Meyer</td><td> =
</td><td class=3D"right">Intended status: Experimental                   =
                D. Meyer</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0001"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">Expires: <span =
class=3D"delete">January 20, 2017</span>                                 =
       Brocade</td><td> </td><td class=3D"rblock">Expires: <span =
class=3D"insert">March 12, 2017  </span>                                 =
       Brocade</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
                                           J. Snijders</td><td> </td><td =
class=3D"right">                                                         =
    J. Snijders</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
                                    NTT Communications</td><td> </td><td =
class=3D"right">                                                      =
NTT Communications</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0002"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
                                       <span class=3D"delete">    July =
19</span>, 2016</td><td> </td><td class=3D"rblock">                      =
                                 <span class=3D"insert">September =
8</span>, 2016</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
LISP Canonical Address Format (LCAF)</td><td> </td><td class=3D"right">  =
                LISP Canonical Address Format (LCAF)</td><td =
class=3D"lineno"></td></tr>
      <tr id=3D"diff0003"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
        draft-ietf-lisp-lcaf-1<span class=3D"delete">4</span></td><td> =
</td><td class=3D"rblock">                        =
draft-ietf-lisp-lcaf-1<span class=3D"insert">5</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Abstract</td><td> =
</td><td class=3D"right">Abstract</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This draft =
defines a canonical address format encoding used in LISP</td><td> =
</td><td class=3D"right">   This draft defines a canonical address =
format encoding used in LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   control =
messages and in the encoding of lookup keys for the LISP</td><td> =
</td><td class=3D"right">   control messages and in the encoding of =
lookup keys for the LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Mapping =
Database System.</td><td> </td><td class=3D"right">   Mapping Database =
System.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Requirements =
Language</td><td> </td><td class=3D"right">Requirements Language</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The key words =
"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td =
class=3D"right">   The key words "MUST", "MUST NOT", "REQUIRED", =
"SHALL", "SHALL NOT",</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-2" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> =
page 1, line 41<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> page 1, line 41<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are working documents of the Internet =
Engineering</td><td> </td><td class=3D"right">   Internet-Drafts are =
working documents of the Internet Engineering</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Task Force =
(IETF).  Note that other groups may also distribute</td><td> </td><td =
class=3D"right">   Task Force (IETF).  Note that other groups may also =
distribute</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   working =
documents as Internet-Drafts.  The list of current Internet-</td><td> =
</td><td class=3D"right">   working documents as Internet-Drafts.  The =
list of current Internet-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td> </td><td =
class=3D"right">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are draft documents valid for a maximum of six =
months</td><td> </td><td class=3D"right">   Internet-Drafts are draft =
documents valid for a maximum of six months</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and may be =
updated, replaced, or obsoleted by other documents at any</td><td> =
</td><td class=3D"right">   and may be updated, replaced, or obsoleted =
by other documents at any</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   time.  It is =
inappropriate to use Internet-Drafts as reference</td><td> </td><td =
class=3D"right">   time.  It is inappropriate to use Internet-Drafts as =
reference</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   material or to =
cite them other than as "work in progress."</td><td> </td><td =
class=3D"right">   material or to cite them other than as "work in =
progress."</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0004"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   This =
Internet-Draft will expire on <span class=3D"delete">January 20</span>, =
2017.</td><td> </td><td class=3D"rblock">   This Internet-Draft will =
expire on <span class=3D"insert">March 12</span>, 2017.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Copyright =
Notice</td><td> </td><td class=3D"right">Copyright Notice</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Copyright (c) =
2016 IETF Trust and the persons identified as the</td><td> </td><td =
class=3D"right">   Copyright (c) 2016 IETF Trust and the persons =
identified as the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   document =
authors.  All rights reserved.</td><td> </td><td class=3D"right">   =
document authors.  All rights reserved.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td =
class=3D"right">   This document is subject to BCP 78 and the IETF =
Trust's Legal</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Provisions =
Relating to IETF Documents</td><td> </td><td class=3D"right">   =
Provisions Relating to IETF Documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
(http://trustee.ietf.org/license-info) in effect on the date of</td><td> =
</td><td class=3D"right">   (http://trustee.ietf.org/license-info) in =
effect on the date of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   publication of =
this document.  Please review these documents</td><td> </td><td =
class=3D"right">   publication of this document.  Please review these =
documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-3" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> =
page 2, line 23<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> page 2, line 23<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   1.  =
Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   =
3</td><td> </td><td class=3D"right">   1.  Introduction  . . . . . . . . =
. . . . . . . . . . . . . . . .   3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   2.  Definition =
of Terms . . . . . . . . . . . . . . . . . . . . .   4</td><td> </td><td =
class=3D"right">   2.  Definition of Terms . . . . . . . . . . . . . . . =
. . . . . .   4</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   3.  LISP =
Canonical Address Format Encodings . . . . . . . . . . .   5</td><td> =
</td><td class=3D"right">   3.  LISP Canonical Address Format Encodings =
. . . . . . . . . . .   5</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   4.  LISP =
Canonical Address Applications . . . . . . . . . . . . .   7</td><td> =
</td><td class=3D"right">   4.  LISP Canonical Address Applications . . =
. . . . . . . . . . .   7</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.1.  =
Segmentation using LISP . . . . . . . . . . . . . . . . .   7</td><td> =
</td><td class=3D"right">     4.1.  Segmentation using LISP . . . . . . =
. . . . . . . . . . .   7</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.2.  =
Carrying AS Numbers in the Mapping Database . . . . . . .   9</td><td> =
</td><td class=3D"right">     4.2.  Carrying AS Numbers in the Mapping =
Database . . . . . . .   9</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.3.  =
Assigning Geo Coordinates to Locator Addresses  . . . . .  10</td><td> =
</td><td class=3D"right">     4.3.  Assigning Geo Coordinates to Locator =
Addresses  . . . . .  10</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.4.  NAT =
Traversal Scenarios . . . . . . . . . . . . . . . . .  12</td><td> =
</td><td class=3D"right">     4.4.  NAT Traversal Scenarios . . . . . . =
. . . . . . . . . . .  12</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.5.  =
Multicast Group Membership Information  . . . . . . . . .  14</td><td> =
</td><td class=3D"right">     4.5.  Multicast Group Membership =
Information  . . . . . . . . .  14</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0005"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.6.  =
Traffic Engineering using Re-encapsulating Tunnels  . . .  1<span =
class=3D"delete">5</span></td><td> </td><td class=3D"rblock">     4.6.  =
Traffic Engineering using Re-encapsulating Tunnels  . . .  1<span =
class=3D"insert">6</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.7.  =
Storing Security Data in the Mapping Database . . . . . .  17</td><td> =
</td><td class=3D"right">     4.7.  Storing Security Data in the Mapping =
Database . . . . . .  17</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0006"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.8.  =
Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  <span =
class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     4.8.  =
Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  <span =
class=3D"insert">19</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.9.  =
Replication List Entries for Multicast Forwarding . . . .  <span =
class=3D"delete">20</span></td><td> </td><td class=3D"rblock">     4.9.  =
Replication List Entries for Multicast Forwarding . . . .  <span =
class=3D"insert">21</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.10. =
Applications for AFI List Type  . . . . . . . . . . . . .  <span =
class=3D"delete">21</span></td><td> </td><td class=3D"rblock">     4.10. =
Applications for AFI List Type  . . . . . . . . . . . . .  <span =
class=3D"insert">22</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.1.  =
Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  <span =
class=3D"delete">21</span></td><td> </td><td class=3D"rblock">       =
4.10.1.  Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  <span =
class=3D"insert">22</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.2.  =
Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">22</span></td><td> </td><td class=3D"rblock">       =
4.10.2.  Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">23</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.3.  =
ASCII Names in the Mapping Database  . . . . . . . .  <span =
class=3D"delete">23</span></td><td> </td><td class=3D"rblock">       =
4.10.3.  ASCII Names in the Mapping Database  . . . . . . . .  <span =
class=3D"insert">24</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.4.  =
Using Recursive LISP Canonical Address Encodings . .  <span =
class=3D"delete">24</span></td><td> </td><td class=3D"rblock">       =
4.10.4.  Using Recursive LISP Canonical Address Encodings . .  <span =
class=3D"insert">25</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.5.  =
Compatibility Mode Use Case  . . . . . . . . . . . .  <span =
class=3D"delete">25</span></td><td> </td><td class=3D"rblock">       =
4.10.5.  Compatibility Mode Use Case  . . . . . . . . . . . .  <span =
class=3D"insert">26</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   5.  =
Experimental LISP Canonical Address Applications  . . . . . .  <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock">   5.  =
Experimental LISP Canonical Address Applications  . . . . . .  <span =
class=3D"insert">27</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.1.  =
Convey Application Specific Data  . . . . . . . . . . . .  <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock">     5.1.  =
Convey Application Specific Data  . . . . . . . . . . . .  <span =
class=3D"insert">27</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.2.  =
Generic Database Mapping Lookups  . . . . . . . . . . . .  <span =
class=3D"delete">27</span></td><td> </td><td class=3D"rblock">     5.2.  =
Generic Database Mapping Lookups  . . . . . . . . . . . .  <span =
class=3D"insert">28</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.3.  PETR =
Admission Control Functionality  . . . . . . . . . .  <span =
class=3D"delete">29</span></td><td> </td><td class=3D"rblock">     5.3.  =
PETR Admission Control Functionality  . . . . . . . . . .  <span =
class=3D"insert">30</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.4.  Data =
Model Encoding . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">30</span></td><td> </td><td class=3D"rblock">     5.4.  =
Data Model Encoding . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">31</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.5.  =
Encoding Key/Value Address Pairs  . . . . . . . . . . . .  <span =
class=3D"delete">31</span></td><td> </td><td class=3D"rblock">     5.5.  =
Encoding Key/Value Address Pairs  . . . . . . . . . . . .  <span =
class=3D"insert">32</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.6.  =
Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">32</span></td><td> </td><td class=3D"rblock">     5.6.  =
Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">33</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   6.  Security =
Considerations . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">34</span></td><td> </td><td class=3D"rblock">   6.  =
Security Considerations . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">36</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   7.  IANA =
Considerations . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">34</span></td><td> </td><td class=3D"rblock">   7.  =
IANA Considerations . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">36</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   8.  =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">35</span></td><td> </td><td class=3D"rblock">   8.  =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">37</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     8.1.  =
Normative References  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">35</span></td><td> </td><td class=3D"rblock">     8.1.  =
Normative References  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">37</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     8.2.  =
Informative References  . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">36</span></td><td> </td><td class=3D"rblock">     8.2.  =
Informative References  . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">38</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Appendix A.  =
Acknowledgments  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">37</span></td><td> </td><td class=3D"rblock">   =
Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">39</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Appendix B.  =
Document Change Log  . . . . . . . . . . . . . . . .  <span =
class=3D"delete">38</span></td><td> </td><td class=3D"rblock">   =
Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  <span =
class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.1.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-14.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.1.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-15.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.2.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-13.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.2.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-14.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.3.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-12.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.3.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-13.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.4.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-11.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.4.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-12.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.5.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-10.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.5.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-11.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.6.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-09.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.6.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-10.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.7.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-08.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.7.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-09.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.8.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-07.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.8.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-08.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.9.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-06.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.9.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-07.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.10. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-05.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.10. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-06.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.11. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-04.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.11. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-05.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.12. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-03.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.12. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-04.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.13. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-02.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.13. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-03.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.14. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-01.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.14. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-02.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.15. =
Changes to draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  <span =
class=3D"delete">40</span></td><td> </td><td class=3D"rblock">     B.15. =
Changes to <span class=3D"insert">draft-ietf-lisp-lcaf-01.txt  . . . . . =
. . . .  42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Authors' =
Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">40</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     B.16. Changes to</span> =
draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  <span =
class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   Authors' Addresses  . . . . . . . . . . . . =
. . . . . . . . . . .  <span class=3D"insert">43</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">1.  =
Introduction</td><td> </td><td class=3D"right">1.  Introduction</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The LISP =
architecture and protocols [RFC6830] introduces two new</td><td> =
</td><td class=3D"right">   The LISP architecture and protocols =
[RFC6830] introduces two new</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   numbering =
spaces, Endpoint Identifiers (EIDs) and Routing Locators</td><td> =
</td><td class=3D"right">   numbering spaces, Endpoint Identifiers =
(EIDs) and Routing Locators</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   (RLOCs).  To =
provide flexibility for current and future applications,</td><td> =
</td><td class=3D"right">   (RLOCs).  To provide flexibility for current =
and future applications,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   these values =
can be encoded in LISP control messages using a general</td><td> =
</td><td class=3D"right">   these values can be encoded in LISP control =
messages using a general</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   syntax that =
includes Address Family Identifier (AFI), length, and</td><td> </td><td =
class=3D"right">   syntax that includes Address Family Identifier (AFI), =
length, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   value =
fields.</td><td> </td><td class=3D"right">   value fields.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-4" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> =
page 4, line 28<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> page 4, line 28<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
describes the currently-defined AFIs the LISP protocol</td><td> </td><td =
class=3D"right">   This document describes the currently-defined AFIs =
the LISP protocol</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   uses along =
with their encodings and introduces the LISP Canonical</td><td> </td><td =
class=3D"right">   uses along with their encodings and introduces the =
LISP Canonical</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address Format =
(LCAF) that can be used to define the LISP-specific</td><td> </td><td =
class=3D"right">   Address Format (LCAF) that can be used to define the =
LISP-specific</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encodings for =
arbitrary AFI values.</td><td> </td><td class=3D"right">   encodings for =
arbitrary AFI values.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">2.  Definition of =
Terms</td><td> </td><td class=3D"right">2.  Definition of Terms</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address Family =
Identifier (AFI):  a term used to describe an address</td><td> </td><td =
class=3D"right">   Address Family Identifier (AFI):  a term used to =
describe an address</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0007"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      encoding =
in a packet.  <span class=3D"delete">There is an address family =
currently</span></td><td> </td><td class=3D"rblock">      encoding in a =
packet.  <span class=3D"insert">Address families are</span> defined for =
IPv4 <span class=3D"insert">and</span></td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"lblock">      defined =
for IPv4 <span class=3D"delete">or IPv6 addresses.</span>  See [AFI] and =
[RFC3232] for</td><td> </td><td class=3D"rblock"><span class=3D"insert"> =
     IPv6.</span>  See [AFI] and [RFC3232] for details.  The reserved =
AFI</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      details.  =
The reserved AFI value of 0 is used in this</td><td> </td><td =
class=3D"rblock">      value of 0 is used in this specification to =
indicate an</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
specification to indicate an unspecified encoded address where =
the</td><td> </td><td class=3D"rblock">      unspecified encoded address =
where the length of the address is 0</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      length of =
the address is 0 bytes following the 16-bit AFI value of</td><td> =
</td><td class=3D"rblock">      bytes following the 16-bit AFI value of =
0.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
0.</td><td> </td><td class=3D"rblock"></td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Unspecified =
Address Format:</td><td> </td><td class=3D"right">   Unspecified Address =
Format:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |            =
AFI =3D 0            |    &lt;nothing follows AFI=3D0&gt;    |</td><td> =
</td><td class=3D"right">   |            AFI =3D 0            |    =
&lt;nothing follows AFI=3D0&gt;    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Endpoint ID =
(EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value</td><td> =
</td><td class=3D"right">   Endpoint ID (EID):   a 32-bit (for IPv4) or =
128-bit (for IPv6) value</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-5" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> =
page 6, line 34<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> page 6, line 34<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 12:  =
Source/Dest Key Type</td><td> </td><td class=3D"right">     Type 12:  =
Source/Dest Key Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 13:  =
Replication List Entry Type</td><td> </td><td class=3D"right">     Type =
13:  Replication List Entry Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 14:  =
JSON Data Model Type</td><td> </td><td class=3D"right">     Type 14:  =
JSON Data Model Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 15:  =
Key/Value Address Pair Type</td><td> </td><td class=3D"right">     Type =
15:  Key/Value Address Pair Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 16:  =
Encapsulation Format Type</td><td> </td><td class=3D"right">     Type =
16:  Encapsulation Format Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0008"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Rsvd2:  this =
8-bit field is reserved for future use and MUST be</td><td> </td><td =
class=3D"rblock">   Rsvd2:  this <span class=3D"insert">LCAF Type =
dependent</span> 8-bit field is reserved for future</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
transmitted as 0 and ignored on receipt.</td><td> </td><td =
class=3D"rblock">      use and MUST be transmitted as 0 and ignored on =
receipt.  <span class=3D"insert">See</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      specific LCAF =
Type for specific bits not reserved.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length:  this =
16-bit field is in units of bytes and covers all of the</td><td> =
</td><td class=3D"right">   Length:  this 16-bit field is in units of =
bytes and covers all of the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      LISP =
Canonical Address payload, starting and including the byte</td><td> =
</td><td class=3D"right">      LISP Canonical Address payload, starting =
and including the byte</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      after the =
Length field.  So any LCAF encoded address will have a</td><td> </td><td =
class=3D"right">      after the Length field.  So any LCAF encoded =
address will have a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      minimum =
length of 8 bytes when the Length field is 0.  The 8 bytes</td><td> =
</td><td class=3D"right">      minimum length of 8 bytes when the Length =
field is 0.  The 8 bytes</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      include the =
AFI, Flags, Type, Reserved, and Length fields.  When</td><td> </td><td =
class=3D"right">      include the AFI, Flags, Type, Reserved, and Length =
fields.  When</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      the AFI is =
not next to encoded address in a control message, then</td><td> </td><td =
class=3D"right">      the AFI is not next to encoded address in a =
control message, then</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      the encoded =
address will have a minimum length of 6 bytes when the</td><td> </td><td =
class=3D"right">      the encoded address will have a minimum length of =
6 bytes when the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Length =
field is 0.  The 6 bytes include the Flags, Type, Reserved,</td><td> =
</td><td class=3D"right">      Length field is 0.  The 6 bytes include =
the Flags, Type, Reserved,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      and Length =
fields.</td><td> </td><td class=3D"right">      and Length =
fields.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC6830] =
states RLOC records are sorted when encoded in control</td><td> </td><td =
class=3D"right">   [RFC6830] states RLOC records are sorted when encoded =
in control</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   messages so =
the locator-set has consistent order across all xTRs for</td><td> =
</td><td class=3D"right">   messages so the locator-set has consistent =
order across all xTRs for</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   a given EID.  =
The sort order is based on sort-key {afi, RLOC-</td><td> </td><td =
class=3D"right">   a given EID.  The sort order is based on sort-key =
{afi, RLOC-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   address}. When =
an RLOC is LCAF encoded, the sort-key is {afi, LCAF-</td><td> </td><td =
class=3D"right">   address}. When an RLOC is LCAF encoded, the sort-key =
is {afi, LCAF-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Type}. =
Therefore, when a locator-set has a mix of AFI records and</td><td> =
</td><td class=3D"right">   Type}. Therefore, when a locator-set has a =
mix of AFI records and</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0009"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   LCAF =
records, <span class=3D"delete">all LCAF records will appear after all =
the AFI records</span>.</td><td> </td><td class=3D"rblock">   LCAF =
records, <span class=3D"insert">they are ordered from smallest to =
largest AFI value</span>.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.  LISP =
Canonical Address Applications</td><td> </td><td class=3D"right">4.  =
LISP Canonical Address Applications</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.1.  =
Segmentation using LISP</td><td> </td><td class=3D"right">4.1.  =
Segmentation using LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When multiple =
organizations inside of a LISP site are using private</td><td> </td><td =
class=3D"right">   When multiple organizations inside of a LISP site are =
using private</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   addresses =
[RFC1918] as EID-prefixes, their address spaces must remain</td><td> =
</td><td class=3D"right">   addresses [RFC1918] as EID-prefixes, their =
address spaces must remain</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   segregated due =
to possible address duplication.  An Instance ID in</td><td> </td><td =
class=3D"right">   segregated due to possible address duplication.  An =
Instance ID in</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   the address =
encoding can aid in making the entire AFI based address</td><td> =
</td><td class=3D"right">   the address encoding can aid in making the =
entire AFI based address</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
unique.</td><td> </td><td class=3D"right">   unique.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-6" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> =
page 13, line 12<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> page 13, line =
12<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   MS RLOC =
Address:  this is the address of the Map-Server used in the</td><td> =
</td><td class=3D"right">   MS RLOC Address:  this is the address of the =
Map-Server used in the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      destination =
RLOC of a packet that has flowed through a NAT device.</td><td> </td><td =
class=3D"right">      destination RLOC of a packet that has flowed =
through a NAT device.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Private ETR =
RLOC Address:  this is an address known to be a private</td><td> =
</td><td class=3D"right">   Private ETR RLOC Address:  this is an =
address known to be a private</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      address =
inserted in this LCAF format by a LISP router that resides</td><td> =
</td><td class=3D"right">      address inserted in this LCAF format by a =
LISP router that resides</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      on the =
private side of a NAT device.</td><td> </td><td class=3D"right">      on =
the private side of a NAT device.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   RTR RLOC =
Address:  this is an encapsulation address used by an ITR or</td><td> =
</td><td class=3D"right">   RTR RLOC Address:  this is an encapsulation =
address used by an ITR or</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      PITR which =
resides behind a NAT device.  This address is known to</td><td> </td><td =
class=3D"right">      PITR which resides behind a NAT device.  This =
address is known to</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      have state =
in a NAT device so packets can flow from it to the LISP</td><td> =
</td><td class=3D"right">      have state in a NAT device so packets can =
flow from it to the LISP</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0010"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      ETR =
behind the NAT.  There can be one or more NAT Tunnel Router</td><td> =
</td><td class=3D"rblock">      ETR behind the NAT.  There can be one or =
more NAT <span class=3D"insert">Reencapsulating</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      <span =
class=3D"delete">(NTR)</span> [I-D.ermagan-lisp-nat-traversal] addresses =
supplied in these</td><td> </td><td class=3D"rblock">      Tunnel Router =
<span class=3D"insert">(RTR)</span> [I-D.ermagan-lisp-nat-traversal] =
addresses</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      set of =
fields.  The number of <span class=3D"delete">NTRs</span> encoded is =
determined by the</td><td> </td><td class=3D"rblock">      supplied in =
these set of fields.  The number of <span class=3D"insert">RTRs</span> =
encoded is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      LCAF =
length field.  When there are no <span class=3D"delete">NTRs</span> =
supplied, the <span class=3D"delete">NTR</span></td><td> </td><td =
class=3D"rblock">      determined by the LCAF length field.  When there =
are no <span class=3D"insert">RTRs</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      fields =
can be omitted and reflected by the LCAF length field or an</td><td> =
</td><td class=3D"rblock">      supplied, the <span =
class=3D"insert">RTR</span> fields can be omitted and reflected by the =
LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      AFI of 0 =
can be used to indicate zero <span class=3D"delete">NTRs</span> =
encoded.</td><td> </td><td class=3D"rblock">      length field or an AFI =
of 0 can be used to indicate zero <span =
class=3D"insert">RTRs</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      encoded.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This =
encoding can be used in Info-Request and Info-Reply</td><td> </td><td =
class=3D"right">   Usage: This encoding can be used in Info-Request and =
Info-Reply</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   messages.  The =
mapping system does not store this information.  The</td><td> </td><td =
class=3D"right">   messages.  The mapping system does not store this =
information.  The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   information is =
used by an xTR and Map-Server to convey private and</td><td> </td><td =
class=3D"right">   information is used by an xTR and Map-Server to =
convey private and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   public address =
information when traversing NAT and firewall devices.</td><td> </td><td =
class=3D"right">   public address information when traversing NAT and =
firewall devices.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.5.  Multicast =
Group Membership Information</td><td> </td><td class=3D"right">4.5.  =
Multicast Group Membership Information</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Multicast =
group information can be published in the mapping database.</td><td> =
</td><td class=3D"right">   Multicast group information can be published =
in the mapping database.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   So a lookup on =
an group address EID can return a replication list of</td><td> </td><td =
class=3D"right">   So a lookup on an group address EID can return a =
replication list of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-7" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> =
page 15, line 11<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> page 15, line =
11<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      of =
(Instance-ID, S-prefix, G-prefix).</td><td> </td><td class=3D"right">    =
  of (Instance-ID, S-prefix, G-prefix).</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Source =
MaskLen:  the mask length of the source prefix that follows.</td><td> =
</td><td class=3D"right">   Source MaskLen:  the mask length of the =
source prefix that follows.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Group MaskLen: =
 the mask length of the group prefix that follows.</td><td> </td><td =
class=3D"right">   Group MaskLen:  the mask length of the group prefix =
that follows.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   AFI =3D x:  x =
can be any AFI value from [AFI].  When a specific AFI has</td><td> =
</td><td class=3D"right">   AFI =3D x:  x can be any AFI value from =
[AFI].  When a specific AFI has</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      its own =
encoding of a multicast address, this field must be either</td><td> =
</td><td class=3D"right">      its own encoding of a multicast address, =
this field must be either</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      a group =
address or a broadcast address.</td><td> </td><td class=3D"right">      =
a group address or a broadcast address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0011"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Source/Subnet =
Address  is the source address or prefix for encoding a</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      (S,G) multicast =
entry.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   Group Address  is =
the group address or group prefix for encoding</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      (S,G) or (*,G) =
multicast entries.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This =
encoding can be used in EID records in Map-Requests, Map-</td><td> =
</td><td class=3D"right">   Usage: This encoding can be used in EID =
records in Map-Requests, Map-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Replies, =
Map-Registers, and Map-Notify messages.  When LISP-DDT</td><td> </td><td =
class=3D"right">   Replies, Map-Registers, and Map-Notify messages.  =
When LISP-DDT</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.ietf-lisp-ddt] is used as the mapping system mechanism, =
extended</td><td> </td><td class=3D"right">   [I-D.ietf-lisp-ddt] is =
used as the mapping system mechanism, extended</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   EIDs are used =
in Map-Referral messages.</td><td> </td><td class=3D"right">   EIDs are =
used in Map-Referral messages.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.6.  Traffic =
Engineering using Re-encapsulating Tunnels</td><td> </td><td =
class=3D"right">4.6.  Traffic Engineering using Re-encapsulating =
Tunnels</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   For a given =
EID lookup into the mapping database, this LCAF format</td><td> </td><td =
class=3D"right">   For a given EID lookup into the mapping database, =
this LCAF format</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   can be =
returned to provide a list of locators in an explicit re-</td><td> =
</td><td class=3D"right">   can be returned to provide a list of =
locators in an explicit re-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encapsulation =
path.  See [I-D.farinacci-lisp-te] for details.</td><td> </td><td =
class=3D"right">   encapsulation path.  See [I-D.farinacci-lisp-te] for =
details.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-8" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> =
page 16, line 25<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> page 16, line =
31<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
           Reencap Hop 1  ...                    |</td><td> </td><td =
class=3D"right">   |                         Reencap Hop 1  ...          =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
Rsvd3         |L|P|S|           AFI =3D x             |</td><td> =
</td><td class=3D"right">   |           Rsvd3         |L|P|S|           =
AFI =3D x             |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
           Reencap Hop k  ...                    |</td><td> </td><td =
class=3D"right">   |                         Reencap Hop k  ...          =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that follow.</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that =
follow.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0012"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd3:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Lookup bit =
(L):  this is the Lookup bit used to indicate to the user</td><td> =
</td><td class=3D"right">   Lookup bit (L):  this is the Lookup bit used =
to indicate to the user</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      of the ELP =
to not use this address for encapsulation but to look</td><td> </td><td =
class=3D"right">      of the ELP to not use this address for =
encapsulation but to look</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      it up in =
the mapping database system to obtain an encapsulating</td><td> </td><td =
class=3D"right">      it up in the mapping database system to obtain an =
encapsulating</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      RLOC =
address.</td><td> </td><td class=3D"right">      RLOC address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   RLOC-Probe bit =
(P):  this is the RLOC-probe bit which means the</td><td> </td><td =
class=3D"right">   RLOC-Probe bit (P):  this is the RLOC-probe bit which =
means the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Reencap Hop =
allows RLOC-probe messages to be sent to it.  When the</td><td> </td><td =
class=3D"right">      Reencap Hop allows RLOC-probe messages to be sent =
to it.  When the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      R-bit is =
set to 0, RLOC-probes must not be sent.  When a Reencap</td><td> =
</td><td class=3D"right">      R-bit is set to 0, RLOC-probes must not =
be sent.  When a Reencap</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Hop is an =
anycast address then multiple physical Reencap Hops are</td><td> =
</td><td class=3D"right">      Hop is an anycast address then multiple =
physical Reencap Hops are</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      using the =
same RLOC address.  In this case, RLOC-probes are not</td><td> </td><td =
class=3D"right">      using the same RLOC address.  In this case, =
RLOC-probes are not</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-9" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> =
page 17, line 35<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> page 18, line =
29<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Locator Address ...     |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Locator =
Address ...     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that start with the Key</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that start =
with the Key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Material =
field.</td><td> </td><td class=3D"right">      Material field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Count:  =
the Key Count field declares the number of Key sections</td><td> =
</td><td class=3D"right">   Key Count:  the Key Count field declares the =
number of Key sections</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      included in =
this LCAF.</td><td> </td><td class=3D"right">      included in this =
LCAF.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0013"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd3:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Algorithm: =
 the Algorithm field identifies the key's</td><td> </td><td =
class=3D"right">   Key Algorithm:  the Algorithm field identifies the =
key's</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
cryptographic algorithm and specifies the format of the Public =
Key</td><td> </td><td class=3D"right">      cryptographic algorithm and =
specifies the format of the Public Key</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0014"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd4:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   R bit:  this =
is the revoke bit and, if set, it specifies that this</td><td> </td><td =
class=3D"right">   R bit:  this is the revoke bit and, if set, it =
specifies that this</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Key is =
being Revoked.</td><td> </td><td class=3D"right">      Key is being =
Revoked.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Length:  =
this field determines the length in bytes of the Key</td><td> </td><td =
class=3D"right">   Key Length:  this field determines the length in =
bytes of the Key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Material =
field.</td><td> </td><td class=3D"right">      Material field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Material:  =
the Key Material field stores the key material.  The</td><td> </td><td =
class=3D"right">   Key Material:  the Key Material field stores the key =
material.  The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      format of =
the key material stored depends on the Key Algorithm</td><td> </td><td =
class=3D"right">      format of the key material stored depends on the =
Key Algorithm</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-10" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 28, line =
5<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 29, line =
5<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D 6 =
   |     Rsvd2     |             3 + n             |</td><td> </td><td =
class=3D"right">   |   Type =3D 6    |     Rsvd2     |             3 + n =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   | Key Field =
Num |      Key Wildcard Fields      |   Key . . .   |</td><td> </td><td =
class=3D"right">   | Key Field Num |      Key Wildcard Fields      |   =
Key . . .   |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
         . . . Key                               |</td><td> </td><td =
class=3D"right">   |                       . . . Key                     =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of the type's payload.  The value n</td><td> =
</td><td class=3D"right">   Length value n:  length in bytes of the =
type's payload.  The value n</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      is the =
number of bytes that follow this Length field.</td><td> </td><td =
class=3D"right">      is the number of bytes that follow this Length =
field.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0015"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Key Field =
Num:  the number of <span class=3D"delete">fields (minus 1)</span> the =
<span class=3D"delete">key</span> can be broken</td><td> </td><td =
class=3D"rblock">   Key Field Num:  the <span class=3D"insert">value of =
this field is the the</span> number of <span =
class=3D"insert">"Key"</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      up into.  =
The width of the <span class=3D"delete">fields</span> are fixed length.  =
So for a key</td><td> </td><td class=3D"rblock"><span class=3D"insert">  =
    sub-fields minus 1,</span> the <span class=3D"insert">"Key" =
field</span> can be broken up into.  <span class=3D"insert">So =
if</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      size of 8 =
bytes, with a Key Field Num of <span class=3D"delete">4</span> allows 4 =
<span class=3D"delete">fields</span> of 2</td><td> </td><td =
class=3D"rblock"><span class=3D"insert">      this field has a value of =
0, there is 1 sub-field in the "Key".</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      bytes in =
length.  Allowing for a reasonable number of 16 field</td><td> </td><td =
class=3D"rblock">      The width of the <span =
class=3D"insert">sub-fields</span> are fixed length.  So for a key =
size</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
separators, valid values range from 0 to 15.</td><td> </td><td =
class=3D"rblock">      of 8 bytes, with a Key Field Num of <span =
class=3D"insert">3,</span> allows 4 <span =
class=3D"insert">sub-fields</span> of 2</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      bytes <span class=3D"insert">each</span> =
in length.  Allowing for a reasonable number of 16 <span =
class=3D"insert">sub-</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      field separators, valid values range =
from 0 to 15.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Wildcard =
Fields:  describes which fields in the key are not used</td><td> =
</td><td class=3D"right">   Key Wildcard Fields:  describes which fields =
in the key are not used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      as part of =
the key lookup.  This wildcard encoding is a bitfield.</td><td> </td><td =
class=3D"right">      as part of the key lookup.  This wildcard encoding =
is a bitfield.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Each bit is =
a don't-care bit for a corresponding field in the key.</td><td> </td><td =
class=3D"right">      Each bit is a don't-care bit for a corresponding =
field in the key.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Bit 0 (the =
low-order bit) in this bitfield corresponds the first</td><td> </td><td =
class=3D"right">      Bit 0 (the low-order bit) in this bitfield =
corresponds the first</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0016"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      field, =
<span class=3D"delete">right-justified</span> in the key, bit 1 the =
second field, and so</td><td> </td><td class=3D"rblock">      field, =
<span class=3D"insert">the low-order field</span> in the key, bit 1 the =
second field, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      on.  When =
a bit is set in the bitfield it is a don't-care bit and</td><td> =
</td><td class=3D"rblock">      so on.  When a bit is set in the =
bitfield it is a don't-care bit</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      should =
not be considered as part of the database lookup.  When the</td><td> =
</td><td class=3D"rblock">      and should not be considered as part of =
the database lookup.  When</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      entire =
16-bits is set to 0, then all bits of the key are used for</td><td> =
</td><td class=3D"rblock">      the entire 16-bits is set to 0, then all =
bits of the key are used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      the =
database lookup.</td><td> </td><td class=3D"rblock">      for the =
database lookup.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key:  the =
variable length key used to do a LISP Database Mapping</td><td> </td><td =
class=3D"right">   Key:  the variable length key used to do a LISP =
Database Mapping</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0017"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      lookup.  =
The length of the key is the value n <span class=3D"delete">(shown =
above) minus</span></td><td> </td><td class=3D"rblock">      lookup.  =
The length of the key is the value n <span class=3D"insert">(as shown =
above).</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">      3.</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This is =
an experimental type where the usage has not been</td><td> </td><td =
class=3D"right">   Usage: This is an experimental type where the usage =
has not been</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   defined =
yet.</td><td> </td><td class=3D"right">   defined yet.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">5.3.  PETR =
Admission Control Functionality</td><td> </td><td class=3D"right">5.3.  =
PETR Admission Control Functionality</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When a public =
PETR device wants to verify who is encapsulating to it,</td><td> =
</td><td class=3D"right">   When a public PETR device wants to verify =
who is encapsulating to it,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   it can check =
for a specific nonce value in the LISP encapsulated</td><td> </td><td =
class=3D"right">   it can check for a specific nonce value in the LISP =
encapsulated</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   packet.  To =
convey the nonce to admitted ITRs or PITRs, this LCAF</td><td> </td><td =
class=3D"right">   packet.  To convey the nonce to admitted ITRs or =
PITRs, this LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   format is used =
in a Map-Register or Map-Reply locator-record.</td><td> </td><td =
class=3D"right">   format is used in a Map-Register or Map-Reply =
locator-record.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-11" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 30, line =
24<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 31, line =
24<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D =
14   |    Rsvd2    |B|             2 + n             |</td><td> </td><td =
class=3D"right">   |   Type =3D 14   |    Rsvd2    |B|             2 + n =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
JSON length         | JSON binary/text encoding ... |</td><td> </td><td =
class=3D"right">   |           JSON length         | JSON binary/text =
encoding ... |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Optional Address ...    |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Optional =
Address ...    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0018"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Length value =
n:  length in bytes of fields that <span =
class=3D"delete">follow.</span></td><td> </td><td class=3D"rblock">   =
Length value n:  length in bytes of <span class=3D"insert">the</span> =
fields that <span class=3D"insert">follow the "JSON</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      length" =
field.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Rsvd{1,2}:  =
must be set to zero and ignore on receipt.</td><td> </td><td =
class=3D"right">   Rsvd{1,2}:  must be set to zero and ignore on =
receipt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   B bit:  =
indicates that the JSON field is binary encoded according to</td><td> =
</td><td class=3D"right">   B bit:  indicates that the JSON field is =
binary encoded according to</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
[JSON-BINARY] when the bit is set to 1.  Otherwise the encoding =
is</td><td> </td><td class=3D"right">      [JSON-BINARY] when the bit is =
set to 1.  Otherwise the encoding is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      based on =
text encoding according to [RFC7159].</td><td> </td><td class=3D"right"> =
     based on text encoding according to [RFC7159].</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   JSON length:  =
length in octets of the following 'JSON binary/text</td><td> </td><td =
class=3D"right">   JSON length:  length in octets of the following 'JSON =
binary/text</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      encoding' =
field.</td><td> </td><td class=3D"right">      encoding' field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-12" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 31, line =
26<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 32, line =
26<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D =
15   |     Rsvd2     |               n               |</td><td> </td><td =
class=3D"right">   |   Type =3D 15   |     Rsvd2     |               n   =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Address as Key ...      |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Address as =
Key ...      |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr id=3D"diff0019"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   |            =
  AFI =3D <span class=3D"delete">x</span>          |       Address as =
Value ...    |</td><td> </td><td class=3D"rblock">   |              AFI =
=3D <span class=3D"insert">y</span>          |       Address as Value =
...    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that follow.</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that =
follow.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Rsvd{1,2}:  =
must be set to zero and ignore on receipt.</td><td> </td><td =
class=3D"right">   Rsvd{1,2}:  must be set to zero and ignore on =
receipt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0020"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   AFI =3D x:  =
x can <span class=3D"delete">be</span> any <span =
class=3D"delete">AFI</span> value from [AFI].  A specific AFI has =
its</td><td> </td><td class=3D"rblock">   AFI =3D x:  x <span =
class=3D"insert">is the "Address as Key" AFI that</span> can <span =
class=3D"insert">have</span> any value from</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      own =
encoding of either a unicast or multicast locator address.</td><td> =
</td><td class=3D"rblock">      [AFI].  A specific AFI has its own =
encoding of either a unicast or</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      All =
RTR/ETR entries for the same level should be combined together</td><td> =
</td><td class=3D"rblock">      multicast locator address.  All RTR/ETR =
entries for the same level</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      by a =
Map-Server to avoid searching through the entire multi-level</td><td> =
</td><td class=3D"rblock">      should be combined together by a =
Map-Server to avoid searching</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      list of =
locator entries in a <span class=3D"delete">Map-Reply</span> =
message.</td><td> </td><td class=3D"rblock">      through the entire =
multi-level list of locator entries in a <span =
class=3D"insert">Map-</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      Reply</span> =
message.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address as =
Key:  this AFI encoded address will be attached with the</td><td> =
</td><td class=3D"right">   Address as Key:  this AFI encoded address =
will be attached with the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      attributes =
encoded in "Address as Value" which follows this field.</td><td> =
</td><td class=3D"right">      attributes encoded in "Address as Value" =
which follows this field.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0021"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">AFI =3D y:  y is the =
"Address of Value" AFI that can have any value</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      from [AFI].  A =
specific AFI has its own encoding of either a</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      unicast or =
multicast locator address.  All RTR/ETR entries for the</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      same level should =
be combined together by a Map-Server to avoid</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      searching through =
the entire multi-level list of locator entries</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      in a Map-Reply =
message.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address as =
Value:  this AFI encoded address will be the attribute</td><td> </td><td =
class=3D"right">   Address as Value:  this AFI encoded address will be =
the attribute</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      address =
that goes along with "Address as Key" which precedes this</td><td> =
</td><td class=3D"right">      address that goes along with "Address as =
Key" which precedes this</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This is =
an experimental type where the usage has not been</td><td> </td><td =
class=3D"right">   Usage: This is an experimental type where the usage =
has not been</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   defined =
yet.</td><td> </td><td class=3D"right">   defined yet.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">5.6.  Multiple =
Data-Planes</td><td> </td><td class=3D"right">5.6.  Multiple =
Data-Planes</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Overlays are =
becoming popular in many parts of the network which have</td><td> =
</td><td class=3D"right">   Overlays are becoming popular in many parts =
of the network which have</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-13" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 36, line =
19<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 38, line =
19<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.coras-lisp-re]</td><td> </td><td class=3D"right">   =
[I-D.coras-lisp-re]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Coras, F., Cabellos-Aparicio, A., Domingo-Pascual, J.,</td><td> </td><td =
class=3D"right">              Coras, F., Cabellos-Aparicio, A., =
Domingo-Pascual, J.,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Maino, F., and D. Farinacci, "LISP Replication</td><td> </td><td =
class=3D"right">              Maino, F., and D. Farinacci, "LISP =
Replication</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Engineering", draft-coras-lisp-re-08 (work in progress),</td><td> =
</td><td class=3D"right">              Engineering", =
draft-coras-lisp-re-08 (work in progress),</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
November 2015.</td><td> </td><td class=3D"right">              November =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.ermagan-lisp-nat-traversal]</td><td> </td><td class=3D"right">   =
[I-D.ermagan-lisp-nat-traversal]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Ermagan, V., Farinacci, D., Lewis, D., Skriver, J., Maino,</td><td> =
</td><td class=3D"right">              Ermagan, V., Farinacci, D., =
Lewis, D., Skriver, J., Maino,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              F., =
and C. White, "NAT traversal for LISP", draft-ermagan-</td><td> </td><td =
class=3D"right">              F., and C. White, "NAT traversal for =
LISP", draft-ermagan-</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0022"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
lisp-nat-traversal-1<span class=3D"delete">0 (work in progress), =
February</span> 2016.</td><td> </td><td class=3D"rblock">              =
lisp-nat-traversal-1<span class=3D"insert">1 (work in progress), =
August</span> 2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.farinacci-lisp-te]</td><td> </td><td class=3D"right">   =
[I-D.farinacci-lisp-te]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Farinacci, D., Kowal, M., and P. Lahiri, "LISP Traffic</td><td> </td><td =
class=3D"right">              Farinacci, D., Kowal, M., and P. Lahiri, =
"LISP Traffic</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0023"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
Engineering Use-Cases", <span =
class=3D"delete">draft-farinacci-lisp-te-10</span> (work</td><td> =
</td><td class=3D"rblock">              Engineering Use-Cases", <span =
class=3D"insert">draft-farinacci-lisp-te-11</span> (work</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
in progress), <span class=3D"delete">March</span> 2016.</td><td> =
</td><td class=3D"rblock">              in progress), <span =
class=3D"insert">September</span> 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.gross-geneve]</td><td> </td><td class=3D"right">   =
[I-D.gross-geneve]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Gross, J., Sridhar, T., Garg, P., Wright, C., Ganga, I.,</td><td> =
</td><td class=3D"right">              Gross, J., Sridhar, T., Garg, P., =
Wright, C., Ganga, I.,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Agarwal, P., Duda, K., Dutt, D., and J. Hudson, "Geneve:</td><td> =
</td><td class=3D"right">              Agarwal, P., Duda, K., Dutt, D., =
and J. Hudson, "Geneve:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Generic Network Virtualization Encapsulation", draft-</td><td> </td><td =
class=3D"right">              Generic Network Virtualization =
Encapsulation", draft-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
gross-geneve-02 (work in progress), October 2014.</td><td> </td><td =
class=3D"right">              gross-geneve-02 (work in progress), =
October 2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.herbert-gue]</td><td> </td><td class=3D"right">   =
[I-D.herbert-gue]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Herbert, T., Yong, L., and O. Zia, "Generic UDP</td><td> </td><td =
class=3D"right">              Herbert, T., Yong, L., and O. Zia, =
"Generic UDP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Encapsulation", draft-herbert-gue-03 (work in progress),</td><td> =
</td><td class=3D"right">              Encapsulation", =
draft-herbert-gue-03 (work in progress),</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-14" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-14"><em> page 38, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-14"><em> page 40, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Thanks goes to =
Michiel Blokzijl and Alberto Rodriguez-Natal for</td><td> </td><td =
class=3D"right">   Thanks goes to Michiel Blokzijl and Alberto =
Rodriguez-Natal for</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   suggesting new =
LCAF types.</td><td> </td><td class=3D"right">   suggesting new LCAF =
types.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Thanks also =
goes to Terry Manderson for assistance obtaining a LISP</td><td> =
</td><td class=3D"right">   Thanks also goes to Terry Manderson for =
assistance obtaining a LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   AFI value from =
IANA.</td><td> </td><td class=3D"right">   AFI value from IANA.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Appendix B.  =
Document Change Log</td><td> </td><td class=3D"right">Appendix B.  =
Document Change Log</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC Editor: =
Please delete this section on publication as RFC.]</td><td> </td><td =
class=3D"right">   [RFC Editor: Please delete this section on =
publication as RFC.]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0024"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1.  Changes =
to draft-ietf-lisp-lcaf-14.txt</td><td> </td><td class=3D"rblock">B.1.  =
Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-15.txt</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Submitted =
September 2016.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Addressed =
comments from Routing Directorate reviewer Stig Venass.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">B.2.  Changes to</span> =
draft-ietf-lisp-lcaf-14.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
July 2016.</td><td> </td><td class=3D"right">   o  Submitted July =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix IDnits =
errors and comments from Luigi Iannone, document</td><td> </td><td =
class=3D"right">   o  Fix IDnits errors and comments from Luigi Iannone, =
document</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
shepherd.</td><td> </td><td class=3D"right">      shepherd.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0025"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">2</span>.  Changes to =
draft-ietf-lisp-lcaf-13.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">3</span>.  Changes to =
draft-ietf-lisp-lcaf-13.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
May 2016.</td><td> </td><td class=3D"right">   o  Submitted May =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Explain the =
Instance-ID LCAF Type is 32-bits in length and the</td><td> </td><td =
class=3D"right">   o  Explain the Instance-ID LCAF Type is 32-bits in =
length and the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Instance-ID =
field in the LISP encapsulation header is 24-bits.</td><td> </td><td =
class=3D"right">      Instance-ID field in the LISP encapsulation header =
is 24-bits.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0026"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">3</span>.  Changes to =
draft-ietf-lisp-lcaf-12.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">4</span>.  Changes to =
draft-ietf-lisp-lcaf-12.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
March 2016.</td><td> </td><td class=3D"right">   o  Submitted March =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Updated =
references and document timer.</td><td> </td><td class=3D"right">   o  =
Updated references and document timer.</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Removed the =
R, J, and L bits from the Multicast Info Type LCAF</td><td> </td><td =
class=3D"right">   o  Removed the R, J, and L bits from the Multicast =
Info Type LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      since =
working group decided to not go forward with draft-</td><td> </td><td =
class=3D"right">      since working group decided to not go forward with =
draft-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
farinacci-lisp-mr-signaling-03.txt in favor of draft- =
ietf-lisp-</td><td> </td><td class=3D"right">      =
farinacci-lisp-mr-signaling-03.txt in favor of draft- ietf-lisp-</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
signal-free-00.txt.</td><td> </td><td class=3D"right">      =
signal-free-00.txt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0027"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">4</span>.  Changes to =
draft-ietf-lisp-lcaf-11.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">5</span>.  Changes to =
draft-ietf-lisp-lcaf-11.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
September 2015.</td><td> </td><td class=3D"right">   o  Submitted =
September 2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Reflecting =
comments from Prague LISP working group.</td><td> </td><td =
class=3D"right">   o  Reflecting comments from Prague LISP working =
group.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Readying =
document for a LISP LCAF registry, RFC publication, and</td><td> =
</td><td class=3D"right">   o  Readying document for a LISP LCAF =
registry, RFC publication, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      for new =
use-cases that will be defined in the new charter.</td><td> </td><td =
class=3D"right">      for new use-cases that will be defined in the new =
charter.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0028"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">5</span>.  Changes to =
draft-ietf-lisp-lcaf-10.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">6</span>.  Changes to =
draft-ietf-lisp-lcaf-10.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
June 2015.</td><td> </td><td class=3D"right">   o  Submitted June =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix =
coauthor Job's contact information.</td><td> </td><td class=3D"right">   =
o  Fix coauthor Job's contact information.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0029"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">6</span>.  Changes to =
draft-ietf-lisp-lcaf-09.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">7</span>.  Changes to =
draft-ietf-lisp-lcaf-09.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
June 2015.</td><td> </td><td class=3D"right">   o  Submitted June =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix IANA =
Considerations section to request a registry to allocate</td><td> =
</td><td class=3D"right">   o  Fix IANA Considerations section to =
request a registry to allocate</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      and track =
LCAF Type values.</td><td> </td><td class=3D"right">      and track LCAF =
Type values.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0030"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">7</span>.  Changes to =
draft-ietf-lisp-lcaf-08.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">8</span>.  Changes to =
draft-ietf-lisp-lcaf-08.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
April 2015.</td><td> </td><td class=3D"right">   o  Submitted April =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Comment =
from Florin.  The Application Data Type length field has a</td><td> =
</td><td class=3D"right">   o  Comment from Florin.  The Application =
Data Type length field has a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      typo.  The =
field should be labeled "12 + n" and not "8 + n".</td><td> </td><td =
class=3D"right">      typo.  The field should be labeled "12 + n" and =
not "8 + n".</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix length =
fields in the sections titled "Using Recursive LISP</td><td> </td><td =
class=3D"right">   o  Fix length fields in the sections titled "Using =
Recursive LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Canonical =
Address Encodings", "Generic Database Mapping Lookups",</td><td> =
</td><td class=3D"right">      Canonical Address Encodings", "Generic =
Database Mapping Lookups",</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      and "Data =
Model Encoding".</td><td> </td><td class=3D"right">      and "Data Model =
Encoding".</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0031"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">8</span>.  Changes to =
draft-ietf-lisp-lcaf-07.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">9</span>.  Changes to =
draft-ietf-lisp-lcaf-07.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
December 2014.</td><td> </td><td class=3D"right">   o  Submitted =
December 2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a new =
LCAF Type called "Encapsulation Format" so decapsulating</td><td> =
</td><td class=3D"right">   o  Add a new LCAF Type called "Encapsulation =
Format" so decapsulating</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      xTRs can =
inform encapsulating xTRs what data-plane encapsulations</td><td> =
</td><td class=3D"right">      xTRs can inform encapsulating xTRs what =
data-plane encapsulations</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      they =
support.</td><td> </td><td class=3D"right">      they support.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0032"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">9</span>.  Changes to =
draft-ietf-lisp-lcaf-06.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">10</span>.  Changes to =
draft-ietf-lisp-lcaf-06.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
October 2014.</td><td> </td><td class=3D"right">   o  Submitted October =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Make it =
clear how sorted RLOC records are done when LCAFs are used</td><td> =
</td><td class=3D"right">   o  Make it clear how sorted RLOC records are =
done when LCAFs are used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      as the RLOC =
record.</td><td> </td><td class=3D"right">      as the RLOC =
record.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0033"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">0</span>.  Changes to =
draft-ietf-lisp-lcaf-05.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">1</span>.  Changes to =
draft-ietf-lisp-lcaf-05.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
May 2014.</td><td> </td><td class=3D"right">   o  Submitted May =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a =
length field of the JSON payload that can be used for either</td><td> =
</td><td class=3D"right">   o  Add a length field of the JSON payload =
that can be used for either</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      binary or =
text encoding of JSON data.</td><td> </td><td class=3D"right">      =
binary or text encoding of JSON data.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0034"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">1</span>.  Changes to =
draft-ietf-lisp-lcaf-04.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">2</span>.  Changes to =
draft-ietf-lisp-lcaf-04.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
January 2014.</td><td> </td><td class=3D"right">   o  Submitted January =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Agreement =
among ELP implementors to have the AFI 16-bit field</td><td> </td><td =
class=3D"right">   o  Agreement among ELP implementors to have the AFI =
16-bit field</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      adjacent to =
the address.  This will make the encoding consistent</td><td> </td><td =
class=3D"right">      adjacent to the address.  This will make the =
encoding consistent</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      with all =
other LCAF type address encodings.</td><td> </td><td class=3D"right">    =
  with all other LCAF type address encodings.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0035"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">2</span>.  Changes to =
draft-ietf-lisp-lcaf-03.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">3</span>.  Changes to =
draft-ietf-lisp-lcaf-03.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
September 2013.</td><td> </td><td class=3D"right">   o  Submitted =
September 2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Updated =
references and author's affilations.</td><td> </td><td class=3D"right">  =
 o  Updated references and author's affilations.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added =
Instance-ID to the Multicast Info Type so there is relative</td><td> =
</td><td class=3D"right">   o  Added Instance-ID to the Multicast Info =
Type so there is relative</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      ease in =
parsing (S,G) entries within a VPN.</td><td> </td><td class=3D"right">   =
   ease in parsing (S,G) entries within a VPN.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add port =
range encodings to the Application Data LCAF Type.</td><td> </td><td =
class=3D"right">   o  Add port range encodings to the Application Data =
LCAF Type.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a new =
JSON LCAF Type.</td><td> </td><td class=3D"right">   o  Add a new JSON =
LCAF Type.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add Address =
Key/Value LCAF Type to allow attributes to be attached</td><td> </td><td =
class=3D"right">   o  Add Address Key/Value LCAF Type to allow =
attributes to be attached</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      to an =
address.</td><td> </td><td class=3D"right">      to an address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0036"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">3</span>.  Changes to =
draft-ietf-lisp-lcaf-02.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">4</span>.  Changes to =
draft-ietf-lisp-lcaf-02.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
March 2013.</td><td> </td><td class=3D"right">   o  Submitted March =
2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added new =
LCAF Type "Replication List Entry" to support LISP</td><td> </td><td =
class=3D"right">   o  Added new LCAF Type "Replication List Entry" to =
support LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      replication =
engineering use-cases.</td><td> </td><td class=3D"right">      =
replication engineering use-cases.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Changed =
references to new LISP RFCs.</td><td> </td><td class=3D"right">   o  =
Changed references to new LISP RFCs.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0037"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">4</span>.  Changes to =
draft-ietf-lisp-lcaf-01.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">5</span>.  Changes to =
draft-ietf-lisp-lcaf-01.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
January 2013.</td><td> </td><td class=3D"right">   o  Submitted January =
2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Change =
longitude range from 0-90 to 0-180 in section 4.4.</td><td> </td><td =
class=3D"right">   o  Change longitude range from 0-90 to 0-180 in =
section 4.4.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added =
reference to WGS-84 in section 4.4.</td><td> </td><td class=3D"right">   =
o  Added reference to WGS-84 in section 4.4.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0038"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">5</span>.  Changes to =
draft-ietf-lisp-lcaf-00.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">6</span>.  Changes to =
draft-ietf-lisp-lcaf-00.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted =
first working group draft August 2012.</td><td> </td><td class=3D"right"> =
  o  Posted first working group draft August 2012.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  This draft =
was renamed from draft-farinacci-lisp-lcaf-10.txt.</td><td> </td><td =
class=3D"right">   o  This draft was renamed from =
draft-farinacci-lisp-lcaf-10.txt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Authors' =
Addresses</td><td> </td><td class=3D"right">Authors' Addresses</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Dino =
Farinacci</td><td> </td><td class=3D"right">   Dino Farinacci</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
lispers.net</td><td> </td><td class=3D"right">   lispers.net</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   San Jose, =
CA</td><td> </td><td class=3D"right">   San Jose, CA</td><td =
class=3D"lineno"></td></tr>

     <tr><td></td><td class=3D"left"></td><td> </td><td =
class=3D"right"></td><td></td></tr>
     <tr id=3D"end" bgcolor=3D"gray"><th colspan=3D"5" =
align=3D"center">&nbsp;End of changes. 38 change blocks.&nbsp;</th></tr>
     <tr class=3D"stats"><td></td><th><i>95 lines changed or =
deleted</i></th><th><i> </i></th><th><i>128 lines changed or =
added</i></th><td></td></tr>
     <tr><td colspan=3D"5" align=3D"center" class=3D"small"><br>This =
html diff was produced by rfcdiff 1.45. The latest version is available =
from <a =
href=3D"http://www.tools.ietf.org/tools/rfcdiff/">http://tools.ietf.org/to=
ols/rfcdiff/</a> </td></tr>
   </tbody></table>
  =20
  =20
</body></html>=

--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii





--Apple-Mail=_F14C54DF-FC1E-47EB-B6F8-161931C27CC9--


From nobody Fri Sep  9 16:15:23 2016
Return-Path: <stig@venaas.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D928212B028 for <lisp@ietfa.amsl.com>; Fri,  9 Sep 2016 16:15:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=venaas-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a3dmoN53yKqG for <lisp@ietfa.amsl.com>; Fri,  9 Sep 2016 16:15:20 -0700 (PDT)
Received: from mail-lf0-x235.google.com (mail-lf0-x235.google.com [IPv6:2a00:1450:4010:c07::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D492412B041 for <lisp@ietf.org>; Fri,  9 Sep 2016 16:15:17 -0700 (PDT)
Received: by mail-lf0-x235.google.com with SMTP id l131so53906953lfl.2 for <lisp@ietf.org>; Fri, 09 Sep 2016 16:15:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=venaas-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=e+VjUqgsVGCpJnnAWCvrL7l8RoM35oSKHIZ7Y+rnExc=; b=zFITBfVPbsj2busSoeUw693vBm97K/RuUZjFqbJnU7wqN/3L2Chc9joNUd+tF0+gBI veuqreaidMGz7usajw++n8zGgnMrCgSoIuPJyyfQuJTfJj2IiZ1rcyiQdCMg98QLz7bn bEmgSvtfbLD5IkI/TjR95+hE6K3LJoxMCKLIQlePo3qouPt1EPvDe44VU+PjlK3oKnrL Cw/8Fol9M8owMC7Mbtd/y9ReikypzlT0nJlj6xXmp4iWoW9iXAPBy6rTvcKPRk92TTLE XsSHtU3LGaLP2r7cZk2xxpT/7T1MBKFGxJYKcdUl+Q0Hz6wbEv7XFZ6aWhtThdkw0hkB D8Tg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=e+VjUqgsVGCpJnnAWCvrL7l8RoM35oSKHIZ7Y+rnExc=; b=Q7GEw6sj8bxeJkAuHlKk8Q1dSvxkrpS0Vck8u8EtzVxh+1ZyuyKLe6YSXWObfPwul1 gvJKCGM9CxONLU0hxJ+zSIwY36rZHBKa31sb4W0HRtUO0TM+aMJkM/GKyD4j3Zqi2Qfy iHS1cSLfyCPA0w9moxcRhAkLisbglK01OfHOxQwslKsNbzFZgr4zq//N0gFyqBl8w0a8 s1SAKOZvlT8j2Lh2zt38vMcUO6Jhyaztuu8Twx8n03yM/MBqtqJvole5CvKdays/yE57 A4UD5F79mus/Aruti+B4NDKTgbi6xDDXQ7MUiVtaH83FeRpvY51wSpMF6AZgqS7X1ksE DNZA==
X-Gm-Message-State: AE9vXwMsNWhFGW0pAAS8kDCzjuKT+zKfqlJiM9ZEkD5gPjXNcAhkhTpoQXBhJGl3bzRDbyhIxXTQuEI7iCGQ2g==
X-Received: by 10.25.29.85 with SMTP id d82mr2101062lfd.60.1473462915703; Fri, 09 Sep 2016 16:15:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.28.15 with HTTP; Fri, 9 Sep 2016 16:15:14 -0700 (PDT)
In-Reply-To: <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com>
From: Stig Venaas <stig@venaas.com>
Date: Fri, 9 Sep 2016 16:15:14 -0700
Message-ID: <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/SjTCbvf0iBmnWVeeoF5FerXodWQ>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Sep 2016 23:15:22 -0000

Hi

On Thu, Sep 8, 2016 at 2:02 PM, Dino Farinacci <farinacci@gmail.com> wrote:
>> Document: draft-ietf-lisp-lcaf-14.txt
>> Reviewer: Stig Venaas
>> Review Date: 2016-09-07
>> IETF LC End Date:
>> Intended Status: Experimental
>
> Thanks Stig for your comments. See responses below. As well as a new vers=
ion -15 not submitted yet but for your quick review. Also find a lcaf-rfcdi=
ff.html file for easy diff viewing.

Thanks. I have some comments inline.

>> Summary:
>> I have some minor concerns about this document that I think should be
>> resolved before publication.
>>
>> The draft is almost ready but there are several places where the text
>> is a bit unclear,
>
> No problem. This document has had a long history and many opinions relate=
d to it has come and gone but we tried to reflect everyone=E2=80=99s point =
of view.
>
>> In section 1 I find this sentence a bit misleading since [AFI] doesn't
>> talk about the formatting.
>>
>>   Currently defined AFIs include IPv4 and IPv6 addresses, which are
>>   formatted according to code-points assigned in [AFI] as follows:
>>
>> Is the formatting shown here for AFI 1 and 2 defined in another
>> document? It would be good to have a reference. If it is introduced
>> in this document, then it should not be in the introduction.
>
> No it is not shown in any document. All the AFI document says is that a 1=
6-bit AFI value of 1 means an IP address follows. That means 4 bytes of add=
ress. And 16 for IPv6 when AFI is 2.
>
> As you can see the reference to the AFI document is at the end of the sen=
tence.
>
>> In section 2, first paragraph it says:
>>   There is an address family currently defined for IPv4 or IPv6
>>   addresses.
>>
>> It would be better to say that address families are defined for IPv4
>> and IPv6 addresses.
>
> Changed.
>
>> In section 3 we have this paragraph:
>>
>>   The Address Family AFI definitions from [AFI] only allocate code-
>>   points for the AFI value itself.  The length of the address or entity
>>   that follows is not defined and is implied based on conventional
>>   experience.  Where the LISP protocol uses LISP Canonical Addresses
>>   specifically, the address length definitions will be in this
>>   specification and take precedent over any other specification.
>>
>> I'm not sure what conventional experience means. Please try to find a
>
> Well like I said above, the AFI values defined in the AFI document are ju=
st type values and there is no length defined. So =E2=80=9Cconventional wis=
dom=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we know what=
 follows is 4 bytes. Ditto for IPv6, MAC addresses, etc.

In theory there should be standards/documents specifying this for each
of the address types, and maybe could write that people should see the
respective standards or something. I don't know if this exists for all
the types though.

>> better way to say it. Regarding the last sentence, what if a you want
>> to define new LCAF encodings in the future? Is it good to say that this
>> specification takes precedent over any other?
>
> LCAF encodings and definitions do not change the length of an AFI encoded=
 address. So I am not sure what you mean.

The last sentence says "Where the LISP protocol uses LISP Canonical
Addresses specifically, the address length definitions will be in this
specification and take precedent over any other specification.". What
if you in the future would like to write a separate specification that
defines additional LISP Canonical address formats?

>> In section 3 we have this paragraph:
>>
>>   Length:  this 16-bit field is in units of bytes and covers all of the
>>      LISP Canonical Address payload, starting and including the byte
>>      after the Length field.  So any LCAF encoded address will have a
>>      minimum length of 8 bytes when the Length field is 0.  The 8 bytes
>>      include the AFI, Flags, Type, Reserved, and Length fields.  When
>>      the AFI is not next to encoded address in a control message, then
>>      the encoded address will have a minimum length of 6 bytes when the
>>      Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
>>      and Length fields.
>>
>> Can you phrase this differently? First it says that any LCAF encoded
>
> No not really. It is precise up to the sentence =E2=80=9CWhen the AFI is =
not ..=E2=80=9D.
>
>> address has a minimum length of 8, but then it goes on to say how it
>> sometimes is only 6. I understand what you're trying to say, but there
>> may be a better way of stating it.
>
> This special case is for some LISP control-messages where the AFI is anot=
her place in the message but the address is somewhere else. Rather than hav=
e the AFI appear twice, the LCAF length needs to be different.
>
> The length field always includes the entire contiguous set of LCAF bytes =
including type, flags, length field, etc.
>
> The language is precise and accurate. Let me know how you think stating w=
hat I did in this comment response can be put in without writing a lot of t=
ext about a special case.

The problem I see is that first you write "So any LCAF encoded address
will have a minimum length of 8 bytes when the Length field is 0." and
then you write "then the encoded address will have a minimum length of
6 bytes when the Length field is 0." I understand what you mean, but I
feel this is a bit confusing.

Maybe you could say something like:

When including the AFI, an LCAF encoded address will have a minimum
length of 8 bytes when the Length field is 0. Or start by saying that
the minimal length is 6, and then say that it will then be 8 when the
AFI is included.

>> In section 3 it says:
>>
>>   Rsvd2:  this 8-bit field is reserved for future use and MUST be
>>      transmitted as 0 and ignored on receipt.
>>
>> Some of the LCAFs specified in this document are using it though. Hence
>> you may need to change this text, and maybe not make it reserved.
>
> I change to say the field is LCAF Type dependent and check the LCAF Type =
definition to see what bits of this field is not reserved.
>
>> The last sentence of section 3 is:
>>
>>   Therefore, when a locator-set has a mix of AFI records and
>>   LCAF records, all LCAF records will appear after all the AFI records.
>>
>> This is not necessarily true. Isn't it possible that one at some point
>> in the future might use other AFI records that have AFI > 16387? IANA
>> has assigned several values beyond 16387.
>
> I will change to order must be in AFI value order.
>
>> In 4.1 it says:
>>   AFI =3D x:  x can be any AFI value from [AFI].
>>
>> Is 16387 always or sometimes allowed? Might be good to clarify that.
>> This also applies
>> to all the other LCAF types with similar language.
>
> Always. And since 16387 is in [AFI] and the sentence above says =E2=80=9C=
can be any AFI value from [AFI]=E2=80=9D that implies it can be an LCAF AFI=
. If I said =E2=80=9Cincluding the LCAF AFI, I would have to make this chan=
ge in a dozen places and would be repetitive.

I'll leave this to you, but one option could be to just mention it
here, and just say that it is true for other types as well. Or mention
somewhere before this in the draft that this is allowed. But you
already say "any AFI", so that should mean that this is allowed.

>> Section 4.4:
>>
>>   RTR RLOC Address:  this is an encapsulation address used by an ITR or
>>      PITR which resides behind a NAT device.  This address is known to
>>      have state in a NAT device so packets can flow from it to the LISP
>>      ETR behind the NAT.  There can be one or more NAT Tunnel Router
>>      (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these
>>      set of fields.  The number of NTRs encoded is determined by the
>>      LCAF length field.  When there are no NTRs supplied, the NTR
>>      fields can be omitted and reflected by the LCAF length field or an
>>      AFI of 0 can be used to indicate zero NTRs encoded.
>>
>> It is not quite clear to me if the NTR fields here are the RTR RLOC
>
>> addresses. Does no NTR fields mean that there are no RTR RLOC addresses?
>> If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
>> 0), and that would have AFI 0?
>
> Good catch. NTR was an old term and the NAT-traversal draft now uses the =
term RTR. I will fix.
>
>> Section 4.5 first paragraph:
>>
>>   Multicast group information can be published in the mapping database.
>>   So a lookup on an group address EID can return a replication list of
>>   RLOC group addresses or RLOC unicast addresses.
>>
>> Can you have a mix of group addresses and unicast addresses? It's also
>
> Yes, it just depends what address you put following the AFI value.
>
>> not so clear from the format what source prefixes are. Are the source
>
> I will state that when an (S,G) is encoded that is what the source addres=
s field is used for.
>
>> prefixes the same as the unicast RLOCs mentioned above? Can you have
>> both multiple source addresses and then multiple group addresses? Can
>> they be in arbitrarty order, or all sources followed by all groups?
>
> As shown it is not a list. And if the AFI=3D0 precedes the Source/Subnet =
Address field it means there is no source address encoded.
>
>> It seems one will need to inspect the address itself to tell whether it
>> is a unicast or multicast address. This is probably fine.
>
> Right.
>
>> Section 4.6
>> Add description of Rsvd3.
>>
>> Section 4.7
>> Add description of Rsvd3 and Rsvd4.
>
> Changed.
>
>> Section 4.10
>> In this section there are several examples of using the AFI List Type,
>> but I miss a general definition. It appears that there can be a variable
>> number of AFIs in the list. Any number > 0? It might be useful to have
>
> Yes, a variable number.

How about adding a few lines of text to 4.10 saying that you can have
a variable number etc., explaining briefly what the general format is.
And then say that what follows are examples?

>> a length field associated with each AFI, or is it OK that parsing fails =
if
>> an AFI is unknown, so that the address length is not known?
>
> Well each AFI has an implicit length per address entry and the LCAF Type =
length has the total length. So why would we need to have yet another lengt=
h and complicate parsing even more? Please be aware (and I=E2=80=99m sure y=
ou are being a senior coder), that the more fields you add to parse, the mo=
re cross-checking of field semantics and lengths have to be done. This real=
ly complicates the code and if part of the LCAF Type is parseable and other=
s are not, then you have a question about what you use and what you discard=
.

I guess I agree with you. Only issue I see is if you at some point
need an implementation to be able to parse past an unkown AFI,
basically not knowing the expected address length of the AFI.

>> Section 4.10.3
>> Isn't it unusual to include the 0 termination? Since you know the
>> length it is not really needed. When parsing one will need to check
>> the length either way, what should one do it the string accidentally
>> is not 0-terminated?
>
> Well the AFI definition in [AFI] doesn=E2=80=99t say how to terminate the=
 string. But the length field will imply it. However, I wrote the =E2=80=9C=
distinguished-name=E2=80=9D draft to specify when AFI=3D17 is used (not onl=
y in a LCAF but by itself), how to terminate the string. I could include th=
at reference, but that draft is not a working group document.
>
> So please advise.

Currently it says:

   Length value n:  length in bytes AFI=3D17 field and the null-terminated
      ASCII string (the last byte of 0 is included).

It might make sense to 0 terminate the DN in some cases, but at least
here we know the string length from the value of n, so I think it
would be better to drop it here. And as I mentioned, you cannot rely
on the 0 for parsing, to be on the safe side you would use n anyway.

>> Section 4.10.4
>> I'm assuming that the recursion is more generic than this example?
>
> Yes.
>
>> It might be worth trying to explain the more generic concept and
>> format, and make sure that this is described as just an example.
>
> I think that can raise too many combinations. It will be hard to explain =
why someone will want to recurse a lot unless we have a well defined use-ca=
se. The fact that an LCAF has an AFI value. It means that an LCAF can be en=
coded wherever an AFI value is allowed.
>
> This section shows a practical example and not a general one that no one =
would know how to use.
>
>> Section 4.10.5
>> This also appears to be just an example.
>
> But a useful one that is already implemented in cisco code.
>
>> Section 5.2
>>   Key Field Num:  the number of fields (minus 1) the key can be broken
>>      up into.  The width of the fields are fixed length.  So for a key
>>      size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
>>      bytes in length.  Allowing for a reasonable number of 16 field
>>      separators, valid values range from 0 to 15.
>>
>> It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
>> 5 fields?
>
> I fixed the description to be more clear.
>
>>   Key Wildcard Fields:  describes which fields in the key are not used
>>      as part of the key lookup.  This wildcard encoding is a bitfield.
>>      Each bit is a don't-care bit for a corresponding field in the key.
>>      Bit 0 (the low-order bit) in this bitfield corresponds the first
>>      field, right-justified in the key, bit 1 the second field, and so
>>      on.  When a bit is set in the bitfield it is a don't-care bit and
>>
>> What does right-justified mean? Does it mean that the first field is the
>> "low order" one? Basically at the end of the message? And the highest
>
> Yes, I will make that more clear.
>
>> order bit corresponds to the part of the key right after the wilcards?
>> I think this need to be explained better to ensure interoperability.
>>
>>   Key:  the variable length key used to do a LISP Database Mapping
>>      lookup.  The length of the key is the value n (shown above) minus
>>      3.
>>
>> Isn't it exactly the value n, since the length is n + 3?
>
> Yes, you are right. Fixed.
>
>> Section 5.4
>>   Length value n:  length in bytes of fields that follow.
>> This is a bit confusing. I think 2+n is the length in bytes that follow
>> the lenght field. While n is the number of bytes after the JSON length.
>
> The 2 is for the JSON length field, since it is a fixed field. The =E2=80=
=9Cn=E2=80=9D is for the remaining variable length fields which include the=
 JSON-binary-text and the AFI address. I=E2=80=99ll make the Length descrip=
tion reflect this. Thanks.
>
>> Section 5.5
>>
>> It says "AFI =3D x" twice in the diagram. Based on this and the way it
>> is described it might seem that the two AFI values must be the same
>> value x, but they can differ, right? I this applies to several other
>> messages types as well.
>
> I=E2=80=99ll change x to y in the second occurence and a description for =
each.
>
>> Section 7
>> It looks like the table in the IANA considerations doesn't include all
>> the types defined in this document.
>
> That was done intentionally. The ones that are experimental are not in th=
is section 7 list because there is no use-case document for it yet. Maybe t=
he chairs can explain this better than me.

I think it's still useful. If someone sees the type used, they can
look it up in the registry. It also helps avoid that someone perhaps
tries to reuse one of these types in new documents. If you really want
to use one of the code points for something else in the future, a new
document could always update the registry.

BTW, it also makes me wonder if it is worth reserving any LCAF types
for experiments.

Regards,
Stig

>> I'm happy to discuss my comments if needed, and also review any
>> updates to this draft.
>>
>> Stig
>
> Let me know about the response where I didn=E2=80=99t make any changes.
>
> Thanks again,
> Dino/Dave/Job
>
>
>
>
>
>
>
>
>


From nobody Mon Sep 12 05:02:04 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A29F12B256; Mon, 12 Sep 2016 05:01:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 81aHXNgt1Hn5; Mon, 12 Sep 2016 05:01:56 -0700 (PDT)
Received: from mail-pf0-x234.google.com (mail-pf0-x234.google.com [IPv6:2607:f8b0:400e:c00::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF5A312B211; Mon, 12 Sep 2016 05:01:55 -0700 (PDT)
Received: by mail-pf0-x234.google.com with SMTP id 128so51820957pfb.3; Mon, 12 Sep 2016 05:01:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=WXK4+MIDry5NK9y+lmB0PCenZwFfuACmO+qMeWG3KfE=; b=VIaXtfWtonMmvjLKHfOrhLm5se5KQclIZRmRtOALELwB0BTa1hGsHzqEsdkvx6jhE+ fMjd9+CqgXA6QtWh9yRfVUU7mghds80BTJ0e4mJBcnt5hMziFIOgFXNG/dfoHYDXbQy5 9zwlEosFzPoNs8vBN+/6tt1kmOBfaTgIaNUl9Mc8mG4wuIjvMEA3ktb8nAmuHxX0OSFP tZDQnNSaRED2rSPKXh1Dxa3NGOw9cg4x55Td6Vwq3UFarXTbuhpyQuRnuQe3b2sNhEbN PUVqO66SkcMLnGmC4zCRX5fvZMj3PtJRPn0nz1oWWpLm1jrNkQnuBAwJ3WwXAd7JWBOC nq1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=WXK4+MIDry5NK9y+lmB0PCenZwFfuACmO+qMeWG3KfE=; b=PF73L+kQR0e7ZDEZZzt8ld5SKYskPcJ+83RMndLITsk6kzCZmkWcos/AmBYOMFil/6 IcdvMgDRdl751HMfwZLDeai3bFOq2hphN5xQFW10SLa0aUMqb6mM0t78SJ9PtS/DW1AX q+bvh1775NCHICqkSMoZZ1hRBkMoLftDFzTEqTRM3Ku18azxON2TwLwsa30nrAO9cemY 8+NUqubidEKUvmbj6lbCWxUreGRKxwsJrvkBML5ixJ4o3M+WHNF/yBiM9t3RN8hE77y9 ud8tziJvf0NouuopNf5V1mIfJu9NqmVd3tp2m+Ic9oyokNiTVq8AzkcuiiVSOVWJjwUb iUqw==
X-Gm-Message-State: AE9vXwNG9HIsqFudN7MjAPkI+SkNHplvVwqMRwparTaNs5z4Ik/2SDUcGPzX8bm8Jwob8A==
X-Received: by 10.98.64.93 with SMTP id n90mr32864822pfa.29.1473681715158; Mon, 12 Sep 2016 05:01:55 -0700 (PDT)
Received: from [10.70.110.216] ([166.170.41.34]) by smtp.gmail.com with ESMTPSA id w63sm4236296pfk.43.2016.09.12.05.01.52 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 12 Sep 2016 05:01:54 -0700 (PDT)
Content-Type: multipart/alternative; boundary=Apple-Mail-E20CC696-ECBE-4FFE-854A-234B01640854
Mime-Version: 1.0 (1.0)
From: Dino Farinacci <farinacci@gmail.com>
X-Mailer: iPhone Mail (14A5346a)
In-Reply-To: <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com>
Date: Mon, 12 Sep 2016 13:01:48 +0100
Content-Transfer-Encoding: 7bit
Message-Id: <6E7490D9-BFC1-442A-A828-0841F2B831EF@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com> <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/GJzXnndPXNr69_Q5RBz2RZN-BWs>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Sep 2016 12:01:59 -0000

--Apple-Mail-E20CC696-ECBE-4FFE-854A-234B01640854
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Stig, I'm traveling this week. I'll get you a reply over this coming weekend=
.=20

Dino

> On Sep 10, 2016, at 12:15 AM, Stig Venaas <stig@venaas.com> wrote:
>=20
> Hi
>=20
> On Thu, Sep 8, 2016 at 2:02 PM, Dino Farinacci <farinacci@gmail.com> wrote=
:
>>> Document: draft-ietf-lisp-lcaf-14.txt
>>> Reviewer: Stig Venaas
>>> Review Date: 2016-09-07
>>> IETF LC End Date:
>>> Intended Status: Experimental
>>=20
>> Thanks Stig for your comments. See responses below. As well as a new vers=
ion -15 not submitted yet but for your quick review. Also find a lcaf-rfcdif=
f.html file for easy diff viewing.
>=20
> Thanks. I have some comments inline.
>=20
>>> Summary:
>>> I have some minor concerns about this document that I think should be
>>> resolved before publication.
>>>=20
>>> The draft is almost ready but there are several places where the text
>>> is a bit unclear,
>>=20
>> No problem. This document has had a long history and many opinions relate=
d to it has come and gone but we tried to reflect everyone=E2=80=99s point o=
f view.
>>=20
>>> In section 1 I find this sentence a bit misleading since [AFI] doesn't
>>> talk about the formatting.
>>>=20
>>>  Currently defined AFIs include IPv4 and IPv6 addresses, which are
>>>  formatted according to code-points assigned in [AFI] as follows:
>>>=20
>>> Is the formatting shown here for AFI 1 and 2 defined in another
>>> document? It would be good to have a reference. If it is introduced
>>> in this document, then it should not be in the introduction.
>>=20
>> No it is not shown in any document. All the AFI document says is that a 1=
6-bit AFI value of 1 means an IP address follows. That means 4 bytes of addr=
ess. And 16 for IPv6 when AFI is 2.
>>=20
>> As you can see the reference to the AFI document is at the end of the sen=
tence.
>>=20
>>> In section 2, first paragraph it says:
>>>  There is an address family currently defined for IPv4 or IPv6
>>>  addresses.
>>>=20
>>> It would be better to say that address families are defined for IPv4
>>> and IPv6 addresses.
>>=20
>> Changed.
>>=20
>>> In section 3 we have this paragraph:
>>>=20
>>>  The Address Family AFI definitions from [AFI] only allocate code-
>>>  points for the AFI value itself.  The length of the address or entity
>>>  that follows is not defined and is implied based on conventional
>>>  experience.  Where the LISP protocol uses LISP Canonical Addresses
>>>  specifically, the address length definitions will be in this
>>>  specification and take precedent over any other specification.
>>>=20
>>> I'm not sure what conventional experience means. Please try to find a
>>=20
>> Well like I said above, the AFI values defined in the AFI document are ju=
st type values and there is no length defined. So =E2=80=9Cconventional wisd=
om=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we know what f=
ollows is 4 bytes. Ditto for IPv6, MAC addresses, etc.
>=20
> In theory there should be standards/documents specifying this for each
> of the address types, and maybe could write that people should see the
> respective standards or something. I don't know if this exists for all
> the types though.
>=20
>>> better way to say it. Regarding the last sentence, what if a you want
>>> to define new LCAF encodings in the future? Is it good to say that this
>>> specification takes precedent over any other?
>>=20
>> LCAF encodings and definitions do not change the length of an AFI encoded=
 address. So I am not sure what you mean.
>=20
> The last sentence says "Where the LISP protocol uses LISP Canonical
> Addresses specifically, the address length definitions will be in this
> specification and take precedent over any other specification.". What
> if you in the future would like to write a separate specification that
> defines additional LISP Canonical address formats?
>=20
>>> In section 3 we have this paragraph:
>>>=20
>>>  Length:  this 16-bit field is in units of bytes and covers all of the
>>>     LISP Canonical Address payload, starting and including the byte
>>>     after the Length field.  So any LCAF encoded address will have a
>>>     minimum length of 8 bytes when the Length field is 0.  The 8 bytes
>>>     include the AFI, Flags, Type, Reserved, and Length fields.  When
>>>     the AFI is not next to encoded address in a control message, then
>>>     the encoded address will have a minimum length of 6 bytes when the
>>>     Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
>>>     and Length fields.
>>>=20
>>> Can you phrase this differently? First it says that any LCAF encoded
>>=20
>> No not really. It is precise up to the sentence =E2=80=9CWhen the AFI is n=
ot ..=E2=80=9D.
>>=20
>>> address has a minimum length of 8, but then it goes on to say how it
>>> sometimes is only 6. I understand what you're trying to say, but there
>>> may be a better way of stating it.
>>=20
>> This special case is for some LISP control-messages where the AFI is anot=
her place in the message but the address is somewhere else. Rather than have=
 the AFI appear twice, the LCAF length needs to be different.
>>=20
>> The length field always includes the entire contiguous set of LCAF bytes i=
ncluding type, flags, length field, etc.
>>=20
>> The language is precise and accurate. Let me know how you think stating w=
hat I did in this comment response can be put in without writing a lot of te=
xt about a special case.
>=20
> The problem I see is that first you write "So any LCAF encoded address
> will have a minimum length of 8 bytes when the Length field is 0." and
> then you write "then the encoded address will have a minimum length of
> 6 bytes when the Length field is 0." I understand what you mean, but I
> feel this is a bit confusing.
>=20
> Maybe you could say something like:
>=20
> When including the AFI, an LCAF encoded address will have a minimum
> length of 8 bytes when the Length field is 0. Or start by saying that
> the minimal length is 6, and then say that it will then be 8 when the
> AFI is included.
>=20
>>> In section 3 it says:
>>>=20
>>>  Rsvd2:  this 8-bit field is reserved for future use and MUST be
>>>     transmitted as 0 and ignored on receipt.
>>>=20
>>> Some of the LCAFs specified in this document are using it though. Hence
>>> you may need to change this text, and maybe not make it reserved.
>>=20
>> I change to say the field is LCAF Type dependent and check the LCAF Type d=
efinition to see what bits of this field is not reserved.
>>=20
>>> The last sentence of section 3 is:
>>>=20
>>>  Therefore, when a locator-set has a mix of AFI records and
>>>  LCAF records, all LCAF records will appear after all the AFI records.
>>>=20
>>> This is not necessarily true. Isn't it possible that one at some point
>>> in the future might use other AFI records that have AFI > 16387? IANA
>>> has assigned several values beyond 16387.
>>=20
>> I will change to order must be in AFI value order.
>>=20
>>> In 4.1 it says:
>>>  AFI =3D x:  x can be any AFI value from [AFI].
>>>=20
>>> Is 16387 always or sometimes allowed? Might be good to clarify that.
>>> This also applies
>>> to all the other LCAF types with similar language.
>>=20
>> Always. And since 16387 is in [AFI] and the sentence above says =E2=80=9C=
can be any AFI value from [AFI]=E2=80=9D that implies it can be an LCAF AFI.=
 If I said =E2=80=9Cincluding the LCAF AFI, I would have to make this change=
 in a dozen places and would be repetitive.
>=20
> I'll leave this to you, but one option could be to just mention it
> here, and just say that it is true for other types as well. Or mention
> somewhere before this in the draft that this is allowed. But you
> already say "any AFI", so that should mean that this is allowed.
>=20
>>> Section 4.4:
>>>=20
>>>  RTR RLOC Address:  this is an encapsulation address used by an ITR or
>>>     PITR which resides behind a NAT device.  This address is known to
>>>     have state in a NAT device so packets can flow from it to the LISP
>>>     ETR behind the NAT.  There can be one or more NAT Tunnel Router
>>>     (NTR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these
>>>     set of fields.  The number of NTRs encoded is determined by the
>>>     LCAF length field.  When there are no NTRs supplied, the NTR
>>>     fields can be omitted and reflected by the LCAF length field or an
>>>     AFI of 0 can be used to indicate zero NTRs encoded.
>>>=20
>>> It is not quite clear to me if the NTR fields here are the RTR RLOC
>>=20
>>> addresses. Does no NTR fields mean that there are no RTR RLOC addresses?=

>>> If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length
>>> 0), and that would have AFI 0?
>>=20
>> Good catch. NTR was an old term and the NAT-traversal draft now uses the t=
erm RTR. I will fix.
>>=20
>>> Section 4.5 first paragraph:
>>>=20
>>>  Multicast group information can be published in the mapping database.
>>>  So a lookup on an group address EID can return a replication list of
>>>  RLOC group addresses or RLOC unicast addresses.
>>>=20
>>> Can you have a mix of group addresses and unicast addresses? It's also
>>=20
>> Yes, it just depends what address you put following the AFI value.
>>=20
>>> not so clear from the format what source prefixes are. Are the source
>>=20
>> I will state that when an (S,G) is encoded that is what the source addres=
s field is used for.
>>=20
>>> prefixes the same as the unicast RLOCs mentioned above? Can you have
>>> both multiple source addresses and then multiple group addresses? Can
>>> they be in arbitrarty order, or all sources followed by all groups?
>>=20
>> As shown it is not a list. And if the AFI=3D0 precedes the Source/Subnet A=
ddress field it means there is no source address encoded.
>>=20
>>> It seems one will need to inspect the address itself to tell whether it
>>> is a unicast or multicast address. This is probably fine.
>>=20
>> Right.
>>=20
>>> Section 4.6
>>> Add description of Rsvd3.
>>>=20
>>> Section 4.7
>>> Add description of Rsvd3 and Rsvd4.
>>=20
>> Changed.
>>=20
>>> Section 4.10
>>> In this section there are several examples of using the AFI List Type,
>>> but I miss a general definition. It appears that there can be a variable=

>>> number of AFIs in the list. Any number > 0? It might be useful to have
>>=20
>> Yes, a variable number.
>=20
> How about adding a few lines of text to 4.10 saying that you can have
> a variable number etc., explaining briefly what the general format is.
> And then say that what follows are examples?
>=20
>>> a length field associated with each AFI, or is it OK that parsing fails i=
f
>>> an AFI is unknown, so that the address length is not known?
>>=20
>> Well each AFI has an implicit length per address entry and the LCAF Type l=
ength has the total length. So why would we need to have yet another length a=
nd complicate parsing even more? Please be aware (and I=E2=80=99m sure you a=
re being a senior coder), that the more fields you add to parse, the more cr=
oss-checking of field semantics and lengths have to be done. This really com=
plicates the code and if part of the LCAF Type is parseable and others are n=
ot, then you have a question about what you use and what you discard.
>=20
> I guess I agree with you. Only issue I see is if you at some point
> need an implementation to be able to parse past an unkown AFI,
> basically not knowing the expected address length of the AFI.
>=20
>>> Section 4.10.3
>>> Isn't it unusual to include the 0 termination? Since you know the
>>> length it is not really needed. When parsing one will need to check
>>> the length either way, what should one do it the string accidentally
>>> is not 0-terminated?
>>=20
>> Well the AFI definition in [AFI] doesn=E2=80=99t say how to terminate the=
 string. But the length field will imply it. However, I wrote the =E2=80=9Cd=
istinguished-name=E2=80=9D draft to specify when AFI=3D17 is used (not only i=
n a LCAF but by itself), how to terminate the string. I could include that r=
eference, but that draft is not a working group document.
>>=20
>> So please advise.
>=20
> Currently it says:
>=20
>   Length value n:  length in bytes AFI=3D17 field and the null-terminated
>      ASCII string (the last byte of 0 is included).
>=20
> It might make sense to 0 terminate the DN in some cases, but at least
> here we know the string length from the value of n, so I think it
> would be better to drop it here. And as I mentioned, you cannot rely
> on the 0 for parsing, to be on the safe side you would use n anyway.
>=20
>>> Section 4.10.4
>>> I'm assuming that the recursion is more generic than this example?
>>=20
>> Yes.
>>=20
>>> It might be worth trying to explain the more generic concept and
>>> format, and make sure that this is described as just an example.
>>=20
>> I think that can raise too many combinations. It will be hard to explain w=
hy someone will want to recurse a lot unless we have a well defined use-case=
. The fact that an LCAF has an AFI value. It means that an LCAF can be encod=
ed wherever an AFI value is allowed.
>>=20
>> This section shows a practical example and not a general one that no one w=
ould know how to use.
>>=20
>>> Section 4.10.5
>>> This also appears to be just an example.
>>=20
>> But a useful one that is already implemented in cisco code.
>>=20
>>> Section 5.2
>>>  Key Field Num:  the number of fields (minus 1) the key can be broken
>>>     up into.  The width of the fields are fixed length.  So for a key
>>>     size of 8 bytes, with a Key Field Num of 4 allows 4 fields of 2
>>>     bytes in length.  Allowing for a reasonable number of 16 field
>>>     separators, valid values range from 0 to 15.
>>>=20
>>> It says minus 1. Doesn't that mean that a Key Field Num of 4 indicates
>>> 5 fields?
>>=20
>> I fixed the description to be more clear.
>>=20
>>>  Key Wildcard Fields:  describes which fields in the key are not used
>>>     as part of the key lookup.  This wildcard encoding is a bitfield.
>>>     Each bit is a don't-care bit for a corresponding field in the key.
>>>     Bit 0 (the low-order bit) in this bitfield corresponds the first
>>>     field, right-justified in the key, bit 1 the second field, and so
>>>     on.  When a bit is set in the bitfield it is a don't-care bit and
>>>=20
>>> What does right-justified mean? Does it mean that the first field is the=

>>> "low order" one? Basically at the end of the message? And the highest
>>=20
>> Yes, I will make that more clear.
>>=20
>>> order bit corresponds to the part of the key right after the wilcards?
>>> I think this need to be explained better to ensure interoperability.
>>>=20
>>>  Key:  the variable length key used to do a LISP Database Mapping
>>>     lookup.  The length of the key is the value n (shown above) minus
>>>     3.
>>>=20
>>> Isn't it exactly the value n, since the length is n + 3?
>>=20
>> Yes, you are right. Fixed.
>>=20
>>> Section 5.4
>>>  Length value n:  length in bytes of fields that follow.
>>> This is a bit confusing. I think 2+n is the length in bytes that follow
>>> the lenght field. While n is the number of bytes after the JSON length.
>>=20
>> The 2 is for the JSON length field, since it is a fixed field. The =E2=80=
=9Cn=E2=80=9D is for the remaining variable length fields which include the J=
SON-binary-text and the AFI address. I=E2=80=99ll make the Length descriptio=
n reflect this. Thanks.
>>=20
>>> Section 5.5
>>>=20
>>> It says "AFI =3D x" twice in the diagram. Based on this and the way it
>>> is described it might seem that the two AFI values must be the same
>>> value x, but they can differ, right? I this applies to several other
>>> messages types as well.
>>=20
>> I=E2=80=99ll change x to y in the second occurence and a description for e=
ach.
>>=20
>>> Section 7
>>> It looks like the table in the IANA considerations doesn't include all
>>> the types defined in this document.
>>=20
>> That was done intentionally. The ones that are experimental are not in th=
is section 7 list because there is no use-case document for it yet. Maybe th=
e chairs can explain this better than me.
>=20
> I think it's still useful. If someone sees the type used, they can
> look it up in the registry. It also helps avoid that someone perhaps
> tries to reuse one of these types in new documents. If you really want
> to use one of the code points for something else in the future, a new
> document could always update the registry.
>=20
> BTW, it also makes me wonder if it is worth reserving any LCAF types
> for experiments.
>=20
> Regards,
> Stig
>=20
>>> I'm happy to discuss my comments if needed, and also review any
>>> updates to this draft.
>>>=20
>>> Stig
>>=20
>> Let me know about the response where I didn=E2=80=99t make any changes.
>>=20
>> Thanks again,
>> Dino/Dave/Job
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20

--Apple-Mail-E20CC696-ECBE-4FFE-854A-234B01640854
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div style=3D"direction: inherit=
;">Stig, I'm traveling this week. I'll get you a reply over this coming week=
end.&nbsp;</div><div style=3D"direction: inherit;"><br></div><div style=3D"d=
irection: inherit;">Dino</div><div><br>On Sep 10, 2016, at 12:15 AM, Stig Ve=
naas &lt;<a href=3D"mailto:stig@venaas.com">stig@venaas.com</a>&gt; wrote:<b=
r><br></div><blockquote type=3D"cite"><div><span>Hi</span><br><span></span><=
br><span>On Thu, Sep 8, 2016 at 2:02 PM, Dino Farinacci &lt;<a href=3D"mailt=
o:farinacci@gmail.com">farinacci@gmail.com</a>&gt; wrote:</span><br><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><span>Document: draft-ietf-lisp-=
lcaf-14.txt</span><br></blockquote></blockquote><blockquote type=3D"cite"><b=
lockquote type=3D"cite"><span>Reviewer: Stig Venaas</span><br></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Review=
 Date: 2016-09-07</span><br></blockquote></blockquote><blockquote type=3D"ci=
te"><blockquote type=3D"cite"><span>IETF LC End Date:</span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Inte=
nded Status: Experimental</span><br></blockquote></blockquote><blockquote ty=
pe=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span>Th=
anks Stig for your comments. See responses below. As well as a new version -=
15 not submitted yet but for your quick review. Also find a lcaf-rfcdiff.htm=
l file for easy diff viewing.</span><br></blockquote><span></span><br><span>=
Thanks. I have some comments inline.</span><br><span></span><br><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span>Summary:</span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>I ha=
ve some minor concerns about this document that I think should be</span><br>=
</blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite=
"><span>resolved before publication.</span><br></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquo=
te></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Th=
e draft is almost ready but there are several places where the text</span><b=
r></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><span>is a bit unclear,</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span>N=
o problem. This document has had a long history and many opinions related to=
 it has come and gone but we tried to reflect everyone=E2=80=99s point of vi=
ew.</span><br></blockquote><blockquote type=3D"cite"><span></span><br></bloc=
kquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>In section 1=
 I find this sentence a bit misleading since [AFI] doesn't</span><br></block=
quote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span=
>talk about the formatting.</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></block=
quote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;Curre=
ntly defined AFIs include IPv4 and IPv6 addresses, which are</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><sp=
an> &nbsp;formatted according to code-points assigned in [AFI] as follows:</=
span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote typ=
e=3D"cite"><span></span><br></blockquote></blockquote><blockquote type=3D"ci=
te"><blockquote type=3D"cite"><span>Is the formatting shown here for AFI 1 a=
nd 2 defined in another</span><br></blockquote></blockquote><blockquote type=
=3D"cite"><blockquote type=3D"cite"><span>document? It would be good to have=
 a reference. If it is introduced</span><br></blockquote></blockquote><block=
quote type=3D"cite"><blockquote type=3D"cite"><span>in this document, then i=
t should not be in the introduction.</span><br></blockquote></blockquote><bl=
ockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cit=
e"><span>No it is not shown in any document. All the AFI document says is th=
at a 16-bit AFI value of 1 means an IP address follows. That means 4 bytes o=
f address. And 16 for IPv6 when AFI is 2.</span><br></blockquote><blockquote=
 type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span=
>As you can see the reference to the AFI document is at the end of the sente=
nce.</span><br></blockquote><blockquote type=3D"cite"><span></span><br></blo=
ckquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>In section=
 2, first paragraph it says:</span><br></blockquote></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;There is an address fa=
mily currently defined for IPv4 or IPv6</span><br></blockquote></blockquote>=
<blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;addresses.<=
/span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote ty=
pe=3D"cite"><span></span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span>It would be better to say that address f=
amilies are defined for IPv4</span><br></blockquote></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><span>and IPv6 addresses.</span><br=
></blockquote></blockquote><blockquote type=3D"cite"><span></span><br></bloc=
kquote><blockquote type=3D"cite"><span>Changed.</span><br></blockquote><bloc=
kquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"=
><blockquote type=3D"cite"><span>In section 3 we have this paragraph:</span>=
<br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"=
cite"><span></span><br></blockquote></blockquote><blockquote type=3D"cite"><=
blockquote type=3D"cite"><span> &nbsp;The Address Family AFI definitions fro=
m [AFI] only allocate code-</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span> &nbsp;points for the AFI value=
 itself. &nbsp;The length of the address or entity</span><br></blockquote></=
blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;=
that follows is not defined and is implied based on conventional</span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span> &nbsp;experience. &nbsp;Where the LISP protocol uses LISP Canonical A=
ddresses</span><br></blockquote></blockquote><blockquote type=3D"cite"><bloc=
kquote type=3D"cite"><span> &nbsp;specifically, the address length definitio=
ns will be in this</span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span> &nbsp;specification and take precedent=
 over any other specification.</span><br></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></b=
lockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>I'm not s=
ure what conventional experience means. Please try to find a</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><span></span><br></blockquote=
><blockquote type=3D"cite"><span>Well like I said above, the AFI values defi=
ned in the AFI document are just type values and there is no length defined.=
 So =E2=80=9Cconventional wisdom=E2=80=9D means that if a spec says an AFI v=
alue 1 is IPv4, we know what follows is 4 bytes. Ditto for IPv6, MAC address=
es, etc.</span><br></blockquote><span></span><br><span>In theory there shoul=
d be standards/documents specifying this for each</span><br><span>of the add=
ress types, and maybe could write that people should see the</span><br><span=
>respective standards or something. I don't know if this exists for all</spa=
n><br><span>the types though.</span><br><span></span><br><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span>better way to say it. Regarding the l=
ast sentence, what if a you want</span><br></blockquote></blockquote><blockq=
uote type=3D"cite"><blockquote type=3D"cite"><span>to define new LCAF encodi=
ngs in the future? Is it good to say that this</span><br></blockquote></bloc=
kquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>specificati=
on takes precedent over any other?</span><br></blockquote></blockquote><bloc=
kquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"=
><span>LCAF encodings and definitions do not change the length of an AFI enc=
oded address. So I am not sure what you mean.</span><br></blockquote><span><=
/span><br><span>The last sentence says "Where the LISP protocol uses LISP Ca=
nonical</span><br><span>Addresses specifically, the address length definitio=
ns will be in this</span><br><span>specification and take precedent over any=
 other specification.". What</span><br><span>if you in the future would like=
 to write a separate specification that</span><br><span>defines additional L=
ISP Canonical address formats?</span><br><span></span><br><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span>In section 3 we have this paragraph:<=
/span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote ty=
pe=3D"cite"><span></span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span> &nbsp;Length: &nbsp;this 16-bit field i=
s in units of bytes and covers all of the</span><br></blockquote></blockquot=
e><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nb=
sp;&nbsp;LISP Canonical Address payload, starting and including the byte</sp=
an><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;after the Length field. &nbsp;So any L=
CAF encoded address will have a</span><br></blockquote></blockquote><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;m=
inimum length of 8 bytes when the Length field is 0. &nbsp;The 8 bytes</span=
><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;include the AFI, Flags, Type, Reserved=
, and Length fields. &nbsp;When</span><br></blockquote></blockquote><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;t=
he AFI is not next to encoded address in a control message, then</span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span> &nbsp;&nbsp;&nbsp;&nbsp;the encoded address will have a minimum leng=
th of 6 bytes when the</span><br></blockquote></blockquote><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;Length field=
 is 0. &nbsp;The 6 bytes include the Flags, Type, Reserved,</span><br></bloc=
kquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><spa=
n> &nbsp;&nbsp;&nbsp;&nbsp;and Length fields.</span><br></blockquote></block=
quote><blockquote type=3D"cite"><blockquote type=3D"cite"><span></span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span>Can you phrase this differently? First it says that any LCAF encoded<=
/span><br></blockquote></blockquote><blockquote type=3D"cite"><span></span><=
br></blockquote><blockquote type=3D"cite"><span>No not really. It is precise=
 up to the sentence =E2=80=9CWhen the AFI is not ..=E2=80=9D.</span><br></bl=
ockquote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><span>address has a minimum length o=
f 8, but then it goes on to say how it</span><br></blockquote></blockquote><=
blockquote type=3D"cite"><blockquote type=3D"cite"><span>sometimes is only 6=
. I understand what you're trying to say, but there</span><br></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>may be=
 a better way of stating it.</span><br></blockquote></blockquote><blockquote=
 type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span=
>This special case is for some LISP control-messages where the AFI is anothe=
r place in the message but the address is somewhere else. Rather than have t=
he AFI appear twice, the LCAF length needs to be different.</span><br></bloc=
kquote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote t=
ype=3D"cite"><span>The length field always includes the entire contiguous se=
t of LCAF bytes including type, flags, length field, etc.</span><br></blockq=
uote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote typ=
e=3D"cite"><span>The language is precise and accurate. Let me know how you t=
hink stating what I did in this comment response can be put in without writi=
ng a lot of text about a special case.</span><br></blockquote><span></span><=
br><span>The problem I see is that first you write "So any LCAF encoded addr=
ess</span><br><span>will have a minimum length of 8 bytes when the Length fi=
eld is 0." and</span><br><span>then you write "then the encoded address will=
 have a minimum length of</span><br><span>6 bytes when the Length field is 0=
." I understand what you mean, but I</span><br><span>feel this is a bit conf=
using.</span><br><span></span><br><span>Maybe you could say something like:<=
/span><br><span></span><br><span>When including the AFI, an LCAF encoded add=
ress will have a minimum</span><br><span>length of 8 bytes when the Length f=
ield is 0. Or start by saying that</span><br><span>the minimal length is 6, a=
nd then say that it will then be 8 when the</span><br><span>AFI is included.=
</span><br><span></span><br><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><span>In section 3 it says:</span><br></blockquote></blockquote><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></=
blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;=
Rsvd2: &nbsp;this 8-bit field is reserved for future use and MUST be</span><=
br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"c=
ite"><span> &nbsp;&nbsp;&nbsp;&nbsp;transmitted as 0 and ignored on receipt.=
</span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote t=
ype=3D"cite"><span></span><br></blockquote></blockquote><blockquote type=3D"=
cite"><blockquote type=3D"cite"><span>Some of the LCAFs specified in this do=
cument are using it though. Hence</span><br></blockquote></blockquote><block=
quote type=3D"cite"><blockquote type=3D"cite"><span>you may need to change t=
his text, and maybe not make it reserved.</span><br></blockquote></blockquot=
e><blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D=
"cite"><span>I change to say the field is LCAF Type dependent and check the L=
CAF Type definition to see what bits of this field is not reserved.</span><b=
r></blockquote><blockquote type=3D"cite"><span></span><br></blockquote><bloc=
kquote type=3D"cite"><blockquote type=3D"cite"><span>The last sentence of se=
ction 3 is:</span><br></blockquote></blockquote><blockquote type=3D"cite"><b=
lockquote type=3D"cite"><span></span><br></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;Therefore, when a lo=
cator-set has a mix of AFI records and</span><br></blockquote></blockquote><=
blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;LCAF records=
, all LCAF records will appear after all the AFI records.</span><br></blockq=
uote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>=
</span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote t=
ype=3D"cite"><span>This is not necessarily true. Isn't it possible that one a=
t some point</span><br></blockquote></blockquote><blockquote type=3D"cite"><=
blockquote type=3D"cite"><span>in the future might use other AFI records tha=
t have AFI &gt; 16387? IANA</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span>has assigned several values bey=
ond 16387.</span><br></blockquote></blockquote><blockquote type=3D"cite"><sp=
an></span><br></blockquote><blockquote type=3D"cite"><span>I will change to o=
rder must be in AFI value order.</span><br></blockquote><blockquote type=3D"=
cite"><span></span><br></blockquote><blockquote type=3D"cite"><blockquote ty=
pe=3D"cite"><span>In 4.1 it says:</span><br></blockquote></blockquote><block=
quote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;AFI =3D x: &nbsp;=
x can be any AFI value from [AFI].</span><br></blockquote></blockquote><bloc=
kquote type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Is 1=
6387 always or sometimes allowed? Might be good to clarify that.</span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span>This also applies</span><br></blockquote></blockquote><blockquote typ=
e=3D"cite"><blockquote type=3D"cite"><span>to all the other LCAF types with s=
imilar language.</span><br></blockquote></blockquote><blockquote type=3D"cit=
e"><span></span><br></blockquote><blockquote type=3D"cite"><span>Always. And=
 since 16387 is in [AFI] and the sentence above says =E2=80=9Ccan be any AFI=
 value from [AFI]=E2=80=9D that implies it can be an LCAF AFI. If I said =E2=
=80=9Cincluding the LCAF AFI, I would have to make this change in a dozen pl=
aces and would be repetitive.</span><br></blockquote><span></span><br><span>=
I'll leave this to you, but one option could be to just mention it</span><br=
><span>here, and just say that it is true for other types as well. Or mentio=
n</span><br><span>somewhere before this in the draft that this is allowed. B=
ut you</span><br><span>already say "any AFI", so that should mean that this i=
s allowed.</span><br><span></span><br><blockquote type=3D"cite"><blockquote t=
ype=3D"cite"><span>Section 4.4:</span><br></blockquote></blockquote><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></=
blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;=
RTR RLOC Address: &nbsp;this is an encapsulation address used by an ITR or</=
span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote typ=
e=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;PITR which resides behind a NAT de=
vice. &nbsp;This address is known to</span><br></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&n=
bsp;have state in a NAT device so packets can flow from it to the LISP</span=
><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;ETR behind the NAT. &nbsp;There can be=
 one or more NAT Tunnel Router</span><br></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;(N=
TR) [I-D.ermagan-lisp-nat-traversal] addresses supplied in these</span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span> &nbsp;&nbsp;&nbsp;&nbsp;set of fields. &nbsp;The number of NTRs enco=
ded is determined by the</span><br></blockquote></blockquote><blockquote typ=
e=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;LCAF len=
gth field. &nbsp;When there are no NTRs supplied, the NTR</span><br></blockq=
uote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>=
 &nbsp;&nbsp;&nbsp;&nbsp;fields can be omitted and reflected by the LCAF len=
gth field or an</span><br></blockquote></blockquote><blockquote type=3D"cite=
"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;AFI of 0 can be u=
sed to indicate zero NTRs encoded.</span><br></blockquote></blockquote><bloc=
kquote type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>It i=
s not quite clear to me if the NTR fields here are the RTR RLOC</span><br></=
blockquote></blockquote><blockquote type=3D"cite"><span></span><br></blockqu=
ote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>addresses. Doe=
s no NTR fields mean that there are no RTR RLOC addresses?</span><br></block=
quote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span=
>If AFI 0 is used, would there be exactly 1 RTR RLOC address (of length</spa=
n><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span>0), and that would have AFI 0?</span><br></blockquote></blockqu=
ote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=
=3D"cite"><span>Good catch. NTR was an old term and the NAT-traversal draft n=
ow uses the term RTR. I will fix.</span><br></blockquote><blockquote type=3D=
"cite"><span></span><br></blockquote><blockquote type=3D"cite"><blockquote t=
ype=3D"cite"><span>Section 4.5 first paragraph:</span><br></blockquote></blo=
ckquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span></span><br=
></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cit=
e"><span> &nbsp;Multicast group information can be published in the mapping d=
atabase.</span><br></blockquote></blockquote><blockquote type=3D"cite"><bloc=
kquote type=3D"cite"><span> &nbsp;So a lookup on an group address EID can re=
turn a replication list of</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span> &nbsp;RLOC group addresses or R=
LOC unicast addresses.</span><br></blockquote></blockquote><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span></span><br></blockquote></blockquote>=
<blockquote type=3D"cite"><blockquote type=3D"cite"><span>Can you have a mix=
 of group addresses and unicast addresses? It's also</span><br></blockquote>=
</blockquote><blockquote type=3D"cite"><span></span><br></blockquote><blockq=
uote type=3D"cite"><span>Yes, it just depends what address you put following=
 the AFI value.</span><br></blockquote><blockquote type=3D"cite"><span></spa=
n><br></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span=
>not so clear from the format what source prefixes are. Are the source</span=
><br></blockquote></blockquote><blockquote type=3D"cite"><span></span><br></=
blockquote><blockquote type=3D"cite"><span>I will state that when an (S,G) i=
s encoded that is what the source address field is used for.</span><br></blo=
ckquote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span>prefixes the same as the unicas=
t RLOCs mentioned above? Can you have</span><br></blockquote></blockquote><b=
lockquote type=3D"cite"><blockquote type=3D"cite"><span>both multiple source=
 addresses and then multiple group addresses? Can</span><br></blockquote></b=
lockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>they be i=
n arbitrarty order, or all sources followed by all groups?</span><br></block=
quote></blockquote><blockquote type=3D"cite"><span></span><br></blockquote><=
blockquote type=3D"cite"><span>As shown it is not a list. And if the AFI=3D0=
 precedes the Source/Subnet Address field it means there is no source addres=
s encoded.</span><br></blockquote><blockquote type=3D"cite"><span></span><br=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>It s=
eems one will need to inspect the address itself to tell whether it</span><b=
r></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><span>is a unicast or multicast address. This is probably fine.</span><b=
r></blockquote></blockquote><blockquote type=3D"cite"><span></span><br></blo=
ckquote><blockquote type=3D"cite"><span>Right.</span><br></blockquote><block=
quote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite">=
<blockquote type=3D"cite"><span>Section 4.6</span><br></blockquote></blockqu=
ote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Add descriptio=
n of Rsvd3.</span><br></blockquote></blockquote><blockquote type=3D"cite"><b=
lockquote type=3D"cite"><span></span><br></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><span>Section 4.7</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><sp=
an>Add description of Rsvd3 and Rsvd4.</span><br></blockquote></blockquote><=
blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"c=
ite"><span>Changed.</span><br></blockquote><blockquote type=3D"cite"><span><=
/span><br></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><=
span>Section 4.10</span><br></blockquote></blockquote><blockquote type=3D"ci=
te"><blockquote type=3D"cite"><span>In this section there are several exampl=
es of using the AFI List Type,</span><br></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><span>but I miss a general defini=
tion. It appears that there can be a variable</span><br></blockquote></block=
quote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>number of AFI=
s in the list. Any number &gt; 0? It might be useful to have</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><span></span><br></blockquote=
><blockquote type=3D"cite"><span>Yes, a variable number.</span><br></blockqu=
ote><span></span><br><span>How about adding a few lines of text to 4.10 sayi=
ng that you can have</span><br><span>a variable number etc., explaining brie=
fly what the general format is.</span><br><span>And then say that what follo=
ws are examples?</span><br><span></span><br><blockquote type=3D"cite"><block=
quote type=3D"cite"><span>a length field associated with each AFI, or is it O=
K that parsing fails if</span><br></blockquote></blockquote><blockquote type=
=3D"cite"><blockquote type=3D"cite"><span>an AFI is unknown, so that the add=
ress length is not known?</span><br></blockquote></blockquote><blockquote ty=
pe=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span>We=
ll each AFI has an implicit length per address entry and the LCAF Type lengt=
h has the total length. So why would we need to have yet another length and c=
omplicate parsing even more? Please be aware (and I=E2=80=99m sure you are b=
eing a senior coder), that the more fields you add to parse, the more cross-=
checking of field semantics and lengths have to be done. This really complic=
ates the code and if part of the LCAF Type is parseable and others are not, t=
hen you have a question about what you use and what you discard.</span><br><=
/blockquote><span></span><br><span>I guess I agree with you. Only issue I se=
e is if you at some point</span><br><span>need an implementation to be able t=
o parse past an unkown AFI,</span><br><span>basically not knowing the expect=
ed address length of the AFI.</span><br><span></span><br><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span>Section 4.10.3</span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>Isn'=
t it unusual to include the 0 termination? Since you know the</span><br></bl=
ockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><s=
pan>length it is not really needed. When parsing one will need to check</spa=
n><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span>the length either way, what should one do it the string acciden=
tally</span><br></blockquote></blockquote><blockquote type=3D"cite"><blockqu=
ote type=3D"cite"><span>is not 0-terminated?</span><br></blockquote></blockq=
uote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote typ=
e=3D"cite"><span>Well the AFI definition in [AFI] doesn=E2=80=99t say how to=
 terminate the string. But the length field will imply it. However, I wrote t=
he =E2=80=9Cdistinguished-name=E2=80=9D draft to specify when AFI=3D17 is us=
ed (not only in a LCAF but by itself), how to terminate the string. I could i=
nclude that reference, but that draft is not a working group document.</span=
><br></blockquote><blockquote type=3D"cite"><span></span><br></blockquote><b=
lockquote type=3D"cite"><span>So please advise.</span><br></blockquote><span=
></span><br><span>Currently it says:</span><br><span></span><br><span> &nbsp=
;&nbsp;Length value n: &nbsp;length in bytes AFI=3D17 field and the null-ter=
minated</span><br><span> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ASCII string (the las=
t byte of 0 is included).</span><br><span></span><br><span>It might make sen=
se to 0 terminate the DN in some cases, but at least</span><br><span>here we=
 know the string length from the value of n, so I think it</span><br><span>w=
ould be better to drop it here. And as I mentioned, you cannot rely</span><b=
r><span>on the 0 for parsing, to be on the safe side you would use n anyway.=
</span><br><span></span><br><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><span>Section 4.10.4</span><br></blockquote></blockquote><blockquote typ=
e=3D"cite"><blockquote type=3D"cite"><span>I'm assuming that the recursion i=
s more generic than this example?</span><br></blockquote></blockquote><block=
quote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite">=
<span>Yes.</span><br></blockquote><blockquote type=3D"cite"><span></span><br=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>It m=
ight be worth trying to explain the more generic concept and</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><sp=
an>format, and make sure that this is described as just an example.</span><b=
r></blockquote></blockquote><blockquote type=3D"cite"><span></span><br></blo=
ckquote><blockquote type=3D"cite"><span>I think that can raise too many comb=
inations. It will be hard to explain why someone will want to recurse a lot u=
nless we have a well defined use-case. The fact that an LCAF has an AFI valu=
e. It means that an LCAF can be encoded wherever an AFI value is allowed.</s=
pan><br></blockquote><blockquote type=3D"cite"><span></span><br></blockquote=
><blockquote type=3D"cite"><span>This section shows a practical example and n=
ot a general one that no one would know how to use.</span><br></blockquote><=
blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span>Section 4.10.5</span><br></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>This a=
lso appears to be just an example.</span><br></blockquote></blockquote><bloc=
kquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"=
><span>But a useful one that is already implemented in cisco code.</span><br=
></blockquote><blockquote type=3D"cite"><span></span><br></blockquote><block=
quote type=3D"cite"><blockquote type=3D"cite"><span>Section 5.2</span><br></=
blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite">=
<span> &nbsp;Key Field Num: &nbsp;the number of fields (minus 1) the key can=
 be broken</span><br></blockquote></blockquote><blockquote type=3D"cite"><bl=
ockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;up into. &nbsp;The wid=
th of the fields are fixed length. &nbsp;So for a key</span><br></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nb=
sp;&nbsp;&nbsp;&nbsp;size of 8 bytes, with a Key Field Num of 4 allows 4 fie=
lds of 2</span><br></blockquote></blockquote><blockquote type=3D"cite"><bloc=
kquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;bytes in length. &nbsp;A=
llowing for a reasonable number of 16 field</span><br></blockquote></blockqu=
ote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&=
nbsp;&nbsp;separators, valid values range from 0 to 15.</span><br></blockquo=
te></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span></=
span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote typ=
e=3D"cite"><span>It says minus 1. Doesn't that mean that a Key Field Num of 4=
 indicates</span><br></blockquote></blockquote><blockquote type=3D"cite"><bl=
ockquote type=3D"cite"><span>5 fields?</span><br></blockquote></blockquote><=
blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"c=
ite"><span>I fixed the description to be more clear.</span><br></blockquote>=
<blockquote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"=
cite"><blockquote type=3D"cite"><span> &nbsp;Key Wildcard Fields: &nbsp;desc=
ribes which fields in the key are not used</span><br></blockquote></blockquo=
te><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&n=
bsp;&nbsp;as part of the key lookup. &nbsp;This wildcard encoding is a bitfi=
eld.</span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquo=
te type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;Each bit is a don't-care bit=
 for a corresponding field in the key.</span><br></blockquote></blockquote><=
blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;=
&nbsp;Bit 0 (the low-order bit) in this bitfield corresponds the first</span=
><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;field, right-justified in the key, bit=
 1 the second field, and so</span><br></blockquote></blockquote><blockquote t=
ype=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;on. &n=
bsp;When a bit is set in the bitfield it is a don't-care bit and</span><br><=
/blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"=
><span></span><br></blockquote></blockquote><blockquote type=3D"cite"><block=
quote type=3D"cite"><span>What does right-justified mean? Does it mean that t=
he first field is the</span><br></blockquote></blockquote><blockquote type=3D=
"cite"><blockquote type=3D"cite"><span>"low order" one? Basically at the end=
 of the message? And the highest</span><br></blockquote></blockquote><blockq=
uote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><=
span>Yes, I will make that more clear.</span><br></blockquote><blockquote ty=
pe=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><blockqu=
ote type=3D"cite"><span>order bit corresponds to the part of the key right a=
fter the wilcards?</span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span>I think this need to be explained bette=
r to ensure interoperability.</span><br></blockquote></blockquote><blockquot=
e type=3D"cite"><blockquote type=3D"cite"><span></span><br></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;Ke=
y: &nbsp;the variable length key used to do a LISP Database Mapping</span><b=
r></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><span> &nbsp;&nbsp;&nbsp;&nbsp;lookup. &nbsp;The length of the key is th=
e value n (shown above) minus</span><br></blockquote></blockquote><blockquot=
e type=3D"cite"><blockquote type=3D"cite"><span> &nbsp;&nbsp;&nbsp;&nbsp;3.<=
/span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote ty=
pe=3D"cite"><span></span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span>Isn't it exactly the value n, since the=
 length is n + 3?</span><br></blockquote></blockquote><blockquote type=3D"ci=
te"><span></span><br></blockquote><blockquote type=3D"cite"><span>Yes, you a=
re right. Fixed.</span><br></blockquote><blockquote type=3D"cite"><span></sp=
an><br></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><spa=
n>Section 5.4</span><br></blockquote></blockquote><blockquote type=3D"cite">=
<blockquote type=3D"cite"><span> &nbsp;Length value n: &nbsp;length in bytes=
 of fields that follow.</span><br></blockquote></blockquote><blockquote type=
=3D"cite"><blockquote type=3D"cite"><span>This is a bit confusing. I think 2=
+n is the length in bytes that follow</span><br></blockquote></blockquote><b=
lockquote type=3D"cite"><blockquote type=3D"cite"><span>the lenght field. Wh=
ile n is the number of bytes after the JSON length.</span><br></blockquote><=
/blockquote><blockquote type=3D"cite"><span></span><br></blockquote><blockqu=
ote type=3D"cite"><span>The 2 is for the JSON length field, since it is a fi=
xed field. The =E2=80=9Cn=E2=80=9D is for the remaining variable length fiel=
ds which include the JSON-binary-text and the AFI address. I=E2=80=99ll make=
 the Length description reflect this. Thanks.</span><br></blockquote><blockq=
uote type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><=
blockquote type=3D"cite"><span>Section 5.5</span><br></blockquote></blockquo=
te><blockquote type=3D"cite"><blockquote type=3D"cite"><span></span><br></bl=
ockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><s=
pan>It says "AFI =3D x" twice in the diagram. Based on this and the way it</=
span><br></blockquote></blockquote><blockquote type=3D"cite"><blockquote typ=
e=3D"cite"><span>is described it might seem that the two AFI values must be t=
he same</span><br></blockquote></blockquote><blockquote type=3D"cite"><block=
quote type=3D"cite"><span>value x, but they can differ, right? I this applie=
s to several other</span><br></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><span>messages types as well.</span><br></blo=
ckquote></blockquote><blockquote type=3D"cite"><span></span><br></blockquote=
><blockquote type=3D"cite"><span>I=E2=80=99ll change x to y in the second oc=
curence and a description for each.</span><br></blockquote><blockquote type=3D=
"cite"><span></span><br></blockquote><blockquote type=3D"cite"><blockquote t=
ype=3D"cite"><span>Section 7</span><br></blockquote></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><span>It looks like the table in th=
e IANA considerations doesn't include all</span><br></blockquote></blockquot=
e><blockquote type=3D"cite"><blockquote type=3D"cite"><span>the types define=
d in this document.</span><br></blockquote></blockquote><blockquote type=3D"=
cite"><span></span><br></blockquote><blockquote type=3D"cite"><span>That was=
 done intentionally. The ones that are experimental are not in this section 7=
 list because there is no use-case document for it yet. Maybe the chairs can=
 explain this better than me.</span><br></blockquote><span></span><br><span>=
I think it's still useful. If someone sees the type used, they can</span><br=
><span>look it up in the registry. It also helps avoid that someone perhaps<=
/span><br><span>tries to reuse one of these types in new documents. If you r=
eally want</span><br><span>to use one of the code points for something else i=
n the future, a new</span><br><span>document could always update the registr=
y.</span><br><span></span><br><span>BTW, it also makes me wonder if it is wo=
rth reserving any LCAF types</span><br><span>for experiments.</span><br><spa=
n></span><br><span>Regards,</span><br><span>Stig</span><br><span></span><br>=
<blockquote type=3D"cite"><blockquote type=3D"cite"><span>I'm happy to discu=
ss my comments if needed, and also review any</span><br></blockquote></block=
quote><blockquote type=3D"cite"><blockquote type=3D"cite"><span>updates to t=
his draft.</span><br></blockquote></blockquote><blockquote type=3D"cite"><bl=
ockquote type=3D"cite"><span></span><br></blockquote></blockquote><blockquot=
e type=3D"cite"><blockquote type=3D"cite"><span>Stig</span><br></blockquote>=
</blockquote><blockquote type=3D"cite"><span></span><br></blockquote><blockq=
uote type=3D"cite"><span>Let me know about the response where I didn=E2=80=99=
t make any changes.</span><br></blockquote><blockquote type=3D"cite"><span><=
/span><br></blockquote><blockquote type=3D"cite"><span>Thanks again,</span><=
br></blockquote><blockquote type=3D"cite"><span>Dino/Dave/Job</span><br></bl=
ockquote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote=
 type=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span=
></span><br></blockquote><blockquote type=3D"cite"><span></span><br></blockq=
uote><blockquote type=3D"cite"><span></span><br></blockquote><blockquote typ=
e=3D"cite"><span></span><br></blockquote><blockquote type=3D"cite"><span></s=
pan><br></blockquote><blockquote type=3D"cite"><span></span><br></blockquote=
><blockquote type=3D"cite"><span></span><br></blockquote></div></blockquote>=
</body></html>=

--Apple-Mail-E20CC696-ECBE-4FFE-854A-234B01640854--


From nobody Tue Sep 13 03:08:44 2016
Return-Path: <ggx@gigix.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE5D512B2C8 for <lisp@ietfa.amsl.com>; Tue, 13 Sep 2016 03:08:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gigix-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m_TD3A8dffr6 for <lisp@ietfa.amsl.com>; Tue, 13 Sep 2016 03:08:31 -0700 (PDT)
Received: from mail-wm0-x230.google.com (mail-wm0-x230.google.com [IPv6:2a00:1450:400c:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B663D12B2D3 for <lisp@ietf.org>; Tue, 13 Sep 2016 03:08:30 -0700 (PDT)
Received: by mail-wm0-x230.google.com with SMTP id 1so191687442wmz.1 for <lisp@ietf.org>; Tue, 13 Sep 2016 03:08:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gigix-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=cUozONWHxZOmPIq3yNqXNDMMFryCFAJE17GQAkK9vOU=; b=zuYUPJrx8udlG2fGTbff6gTxtdo1SPz0fKjADecpl5S+kTJ6+EKmMXftlXwwWT+HQh xo5JecTo9CL6rC6lwrIQBUlrq5MrbteLfh4EEwK6+AmOatXa/OUFE2V36eJYN8Wm9LsQ L/Ew6ivIvEdYjopFIWdqD0Ub85uGgre5AW5azJ/WqiPAzYkOK/OaA8+iH1l53bCR38i9 QZqX5yrKStVhagHvkbjFCxdEM4A0/jXBWwhhS6oRPmkPzXq86pAuw+R4pZVqi+D7nf/r Qh1XhjY8uduCJWiUAaEs56OeWtd2b8zcF6+vpQsFdWvR+cHfgFNA86gSqxrZNLeWMWoO IGtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=cUozONWHxZOmPIq3yNqXNDMMFryCFAJE17GQAkK9vOU=; b=MEqb/x2NKC/+rttMWn6T590gCbZkskU4WuGvITVxJ9d2MXyjS/TId+6dmDq4E/B6Ej CxHwbfCxNvonBMI2LfQh3XSiJoLE0e8EmzBQr4hlIeT6BBCSuqoQ+oQcNJl0Mnwt2N37 iZV+4YRR6BP3e9j84cAzA9pvtGGYLb544CogilBrTQOS4G+afzN0RMyBgBlEzc8e4Yg+ T7U2GPkJHr+I6bBU794MIpGoD8zdeU5Rhd5tD1hwUeMqKss6O4I8/fYLyxqJ1Lp1Fvxb uHeRXdsb6t3ODWWQhGE572mobNc0UwjOJ02MS3oqCf1gW8UXhoKgqEPJ1OPmd/rqG/Fu rYiQ==
X-Gm-Message-State: AE9vXwMEEhkJQN4WpqecxcJpM+XcrkcSGFJ6a200a6A3fy+moyVYRYc+BpHja76ZuyXiuw==
X-Received: by 10.28.14.144 with SMTP id 138mr15835218wmo.96.1473761309174; Tue, 13 Sep 2016 03:08:29 -0700 (PDT)
Received: from ?IPv6:2a01:e35:1381:3430:5d2a:dbd5:c77c:ac65? ([2a01:e35:1381:3430:5d2a:dbd5:c77c:ac65]) by smtp.gmail.com with ESMTPSA id m5sm28735894wmd.1.2016.09.13.03.08.27 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 13 Sep 2016 03:08:27 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Luigi Iannone <ggx@gigix.net>
In-Reply-To: <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com>
Date: Tue, 13 Sep 2016 12:08:26 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <AECE0C18-C821-4614-87A9-A0D3DA9FD192@gigix.net>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/nnN5-w7uIaM8WQQz-GKzXA8zyg0>
Cc: rtg-ads@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org, rtg-dir@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2016 10:08:37 -0000

Hi Stig,

thanks for the review.

Just a quick comment on one of the last point you raised:

> On 08 Sep 2016, at 23:02, Dino Farinacci <farinacci@gmail.com> wrote:
>=20

[snip]

>=20
>> Section 7
>> It looks like the table in the IANA considerations doesn't include =
all
>> the types defined in this document.
>=20
> That was done intentionally. The ones that are experimental are not in =
this section 7 list because there is no use-case document for it yet. =
Maybe the chairs can explain this better than me.
>=20

AFAIR the rationale was that since these types are experimental =
proposals, with no (or at least not yet) detailed use-case, there is no =
need to allocate these values now.
If new documents will use them, than those documents will require =
allocation in their IANA section.

ciao

L.
=20


>> I'm happy to discuss my comments if needed, and also review any
>> updates to this draft.
>>=20
>> Stig
>=20
> Let me know about the response where I didn=E2=80=99t make any =
changes.
>=20
> Thanks again,
> Dino/Dave/Job
>=20
> <draft-ietf-lisp-lcaf-15.txt>
>=20
> <lcaf-rfcdiff.html>


From nobody Fri Sep 16 10:29:40 2016
Return-Path: <dino@lispers.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6E7C12B154 for <lisp@ietfa.amsl.com>; Fri, 16 Sep 2016 10:29:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lispers-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wAi5pQK75p9U for <lisp@ietfa.amsl.com>; Fri, 16 Sep 2016 10:29:36 -0700 (PDT)
Received: from mail-wm0-x22d.google.com (mail-wm0-x22d.google.com [IPv6:2a00:1450:400c:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 457CF12B061 for <lisp@ietf.org>; Fri, 16 Sep 2016 10:29:36 -0700 (PDT)
Received: by mail-wm0-x22d.google.com with SMTP id b187so48511593wme.1 for <lisp@ietf.org>; Fri, 16 Sep 2016 10:29:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lispers-net.20150623.gappssmtp.com; s=20150623; h=from:content-transfer-encoding:subject:date:references:to :message-id:mime-version; bh=W8tbiu7kdYLzu0AlskFmi0Ci+qv9PJfipGDwbLZjQmU=; b=1WWF12k+B+9ro6Fdikayh3FX6qplDx2/Knp6O/Vpz9ylCwLG3LfvBJu7OupfJ3/68b pCs5RvXnXglfr1Ca3sokSJeRnsJsOEZHYvTPQIhM6biha4ciMp1vlfcjDWSGxSzXbnrl ggcB8ktD4zXyfYYdDR9wwurVGsCcxWI22VqW4IAFmdjArrITUuGSH82vVdISxJIzVqT1 NI/mrCaEUNo6hkL2/yYe9G6waJB6Z+/mljsKrOz9IqeF+y9fphZiqJQn001FRZ7rfDC0 Xs5tbblnbEHDDBA9YH+uEegp5hvbIfxqLjQiK2tPj+SxPZa69nGpNQz14JtAr9gwEPiD JPrA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:content-transfer-encoding:subject:date :references:to:message-id:mime-version; bh=W8tbiu7kdYLzu0AlskFmi0Ci+qv9PJfipGDwbLZjQmU=; b=kgoy2wVqzHm4BRvRFmrPEwgD4tn9oisICGqQw3DrHMjTw9FBKWJu8Wekfi88i3z9Dl dmB61HDLErXCvoq53v7x0ZpUgj8ayBoqJGpWyDSDib6kg55AxnzMiWsx+6xpyUP0w9BU a0BqYwNzaJfLrwyo272WN0R43Q+3vu/RsurRj9ZP/9LyyUBcAX/HIOvi/xTwsgeR3pqd i/mjtkcGzka6OnWJWbaR5BbSH6W7vJyvtk0jhO/P52gdq5Fw9jM4FfFUnxnm5Thcs0GR 2ROEZ9SjJSSSxLAge4MSfts9/SZvgjzJaKBlQBY+kfnt7ULA9sBaniSaPQj2p/R7hMwa NQzg==
X-Gm-Message-State: AE9vXwP4k0bV8sC62+cym0+ZaNpsSvqBH3iL2bLDmD1xR4hjzkiGvnoKdo9UtHsPBfIqrA==
X-Received: by 10.194.105.37 with SMTP id gj5mr14801770wjb.113.1474046974233;  Fri, 16 Sep 2016 10:29:34 -0700 (PDT)
Received: from [192.168.0.46] ([31.216.237.178]) by smtp.gmail.com with ESMTPSA id ml1sm9318247wjb.46.2016.09.16.10.29.33 for <lisp@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 16 Sep 2016 10:29:33 -0700 (PDT)
From: Dino Farinacci <dino@lispers.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Fri, 16 Sep 2016 10:29:36 -0700
References: <147389225542.29861.17903245494719063870.idtracker@ietfa.amsl.com>
To: LISP mailing list list <lisp@ietf.org>
Message-Id: <3884EBC9-1BFB-4BFE-9217-983250C62ED8@lispers.net>
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/1idAzTzpIIeQfwDdYkp7BpzDHUQ>
Subject: [lisp] Fwd: I-D Action: draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Sep 2016 17:29:39 -0000

FYI.

Dino

> Begin forwarded message:
>=20
> From: internet-drafts@ietf.org
> Subject: I-D Action: draft-padma-ideas-problem-statement-00.txt
> Date: September 14, 2016 at 3:30:55 PM PDT
> To: <i-d-announce@ietf.org>
> Reply-To: internet-drafts@ietf.org
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
>=20
>=20
>        Title           : Problem Statement for Mapping Systems in =
Identity Enabled Networks
>        Authors         : Padma Pillay-Esnault
>                          Dino Farinacci
>                          Dave Meyer
>                          David Lake
>                          Tom Herbert
>                          Michael Menthe
>                          Dipenkar (Ray) Raychaudhuri
>                          Julius Mueller
> 	Filename        : draft-padma-ideas-problem-statement-00.txt
> 	Pages           : 25
> 	Date            : 2016-09-14
>=20
> Abstract:
>   This document provides a brief overview of Identity Enabled Networks
>   (IDEAS) and discusses the need for a standardized network mapping
>   system that is scalable, robust and flexible for future networks.
>   This memo also identifies several key areas that should be
>   investigated for the architecture design of these network mapping
>   systems and their protocol interfaces.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-padma-ideas-problem-statement/
>=20
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-padma-ideas-problem-statement-00
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


From nobody Mon Sep 19 08:57:23 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7352F12B4A5; Mon, 19 Sep 2016 08:57:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.288
X-Spam-Level: 
X-Spam-Status: No, score=-1.288 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, T_HTML_ATTACH=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wOM1SG6HZkOC; Mon, 19 Sep 2016 08:57:10 -0700 (PDT)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com [IPv6:2607:f8b0:400e:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBCA812B46D; Mon, 19 Sep 2016 08:55:04 -0700 (PDT)
Received: by mail-pa0-x231.google.com with SMTP id oz2so45335346pac.2; Mon, 19 Sep 2016 08:55:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=PB+eTparWnoZlMg5Y52rkU+qIXvWYxlCuY1aUDsdbDk=; b=t16Hh3BiJqTnciihMfJri5zXkLc4o6nxC198NN/vjNcKeQLSt+S/+9qftzzunqMxci SUdgcuPnh6m5IkxEX8UCj6D6k8nFGg3urynJl3wcdnB6+HVRnJfimIIl18OTXBLwCOaD vLl2xlUQsOPsUxoIjgUc0/LAnpEoe4OpbruUOjL6XG5w8Sp6P7JDcw/EeShLTU+UrUrZ A3oIP8Z5pEL2DlxMAH2uZ1TU/KIXkq4m2yqeFVoYhUMLR6QOPLVHcA6KqEeD2JhHQ+EI RLH3BkVuxRt3Fx9bhYEYqw1RhIn45jGpFQW7Fa9CXmLPpmzGuT889AXfIoMRBXiCW0Ft 1qAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=PB+eTparWnoZlMg5Y52rkU+qIXvWYxlCuY1aUDsdbDk=; b=VIHK9LYZnam6Bx4iXrRNM1iy/Eo6RYEtJimbtIlGBSRxy9LHDBv31aGB3fC6xLaiV4 RTNPM/iACrTr8xFSCVzCvnbXVXGeG5lBrVJAur+Z3CKu1m+b1wd1bzK7LHyIepksKdpc KaVPcsa5s4n5g3w8esYcZUrsSknY/ndCp7yUnUDD4z2aQuBAko3yWe2UhCo/jRzP6Fi7 hYD028LeNpjDicEYIZFY5QGZx2bdo/lBj1wvho+6hwqQ6Tei+1UQlxTNvDFtBqMWVjnt 7p3Ea+IV35NElD7/o89e+0Sa36+xI3AWUCnEcPIHNtbSfdcrzkXdNBnNwxB9GvQ+m2qf f5Sw==
X-Gm-Message-State: AE9vXwPD3iIzpRNjvsdKki0wsQgXmRzDbwvthzsyVULcoL/vLVYkpn1vH7PYKLjlIvj8Rg==
X-Received: by 10.66.120.69 with SMTP id la5mr37858718pab.65.1474300504350; Mon, 19 Sep 2016 08:55:04 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id e1sm32669087pap.11.2016.09.19.08.54.58 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 19 Sep 2016 08:55:02 -0700 (PDT)
Content-Type: multipart/mixed; boundary="Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com>
Date: Mon, 19 Sep 2016 08:54:55 -0700
Message-Id: <606F6D6C-B9A9-402E-8C04-96EF867C6E89@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com> <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/Zx6vAGg98rDWR3YmQCUe3dK-5gA>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 15:57:19 -0000

--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

> On Sep 9, 2016, at 4:15 PM, Stig Venaas <stig@venaas.com> wrote:
>=20
>>> In section 3 we have this paragraph:
>>>=20
>>>  The Address Family AFI definitions from [AFI] only allocate code-
>>>  points for the AFI value itself.  The length of the address or =
entity
>>>  that follows is not defined and is implied based on conventional
>>>  experience.  Where the LISP protocol uses LISP Canonical Addresses
>>>  specifically, the address length definitions will be in this
>>>  specification and take precedent over any other specification.
>>>=20
>>> I'm not sure what conventional experience means. Please try to find =
a
>>=20
>> Well like I said above, the AFI values defined in the AFI document =
are just type values and there is no length defined. So =E2=80=9Cconventio=
nal wisdom=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we =
know what follows is 4 bytes. Ditto for IPv6, MAC addresses, etc.
>=20
> In theory there should be standards/documents specifying this for each
> of the address types, and maybe could write that people should see the
> respective standards or something. I don't know if this exists for all
> the types though.

It does not. But how about I promise you that when there is a new =
use-case for a specific AFI, we=E2=80=99ll make sure that the AFI and =
its length are defined in that use-case document.

Like I said, we have this for AFI=3D17 already. So I have already set an =
example.

>> better way to say it. Regarding the last sentence, what if a you want
>>> to define new LCAF encodings in the future? Is it good to say that =
this
>>> specification takes precedent over any other?
>>=20
>> LCAF encodings and definitions do not change the length of an AFI =
encoded address. So I am not sure what you mean.
>=20
> The last sentence says "Where the LISP protocol uses LISP Canonical
> Addresses specifically, the address length definitions will be in this
> specification and take precedent over any other specification.". What
> if you in the future would like to write a separate specification that
> defines additional LISP Canonical address formats?

Okay, I have clarified that new LCAFs that are defined in other =
documents will specify length and formatting definitions.

>> In section 3 we have this paragraph:
>>>=20
>>>  Length:  this 16-bit field is in units of bytes and covers all of =
the
>>>     LISP Canonical Address payload, starting and including the byte
>>>     after the Length field.  So any LCAF encoded address will have a
>>>     minimum length of 8 bytes when the Length field is 0.  The 8 =
bytes
>>>     include the AFI, Flags, Type, Reserved, and Length fields.  When
>>>     the AFI is not next to encoded address in a control message, =
then
>>>     the encoded address will have a minimum length of 6 bytes when =
the
>>>     Length field is 0.  The 6 bytes include the Flags, Type, =
Reserved,
>>>     and Length fields.
>>>=20
>>> Can you phrase this differently? First it says that any LCAF encoded
>>=20
>> No not really. It is precise up to the sentence =E2=80=9CWhen the AFI =
is not ..=E2=80=9D.
>>=20
>>> address has a minimum length of 8, but then it goes on to say how it
>>> sometimes is only 6. I understand what you're trying to say, but =
there
>>> may be a better way of stating it.
>>=20
>> This special case is for some LISP control-messages where the AFI is =
another place in the message but the address is somewhere else. Rather =
than have the AFI appear twice, the LCAF length needs to be different.
>>=20
>> The length field always includes the entire contiguous set of LCAF =
bytes including type, flags, length field, etc.
>>=20
>> The language is precise and accurate. Let me know how you think =
stating what I did in this comment response can be put in without =
writing a lot of text about a special case.
>=20
> The problem I see is that first you write "So any LCAF encoded address
> will have a minimum length of 8 bytes when the Length field is 0." and
> then you write "then the encoded address will have a minimum length of
> 6 bytes when the Length field is 0." I understand what you mean, but I
> feel this is a bit confusing.
>=20
> Maybe you could say something like:
>=20
> When including the AFI, an LCAF encoded address will have a minimum
> length of 8 bytes when the Length field is 0. Or start by saying that
> the minimal length is 6, and then say that it will then be 8 when the
> AFI is included.

Changed to add your suggestion. Thanks.

>>> Section 4.10
>>> In this section there are several examples of using the AFI List =
Type,
>>> but I miss a general definition. It appears that there can be a =
variable
>>> number of AFIs in the list. Any number > 0? It might be useful to =
have
>>=20
>> Yes, a variable number.
>=20
> How about adding a few lines of text to 4.10 saying that you can have
> a variable number etc., explaining briefly what the general format is.
> And then say that what follows are examples?

Done.

> Section 4.10.3
>>> Isn't it unusual to include the 0 termination? Since you know the
>>> length it is not really needed. When parsing one will need to check
>>> the length either way, what should one do it the string accidentally
>>> is not 0-terminated?
>>=20
>> Well the AFI definition in [AFI] doesn=E2=80=99t say how to terminate =
the string. But the length field will imply it. However, I wrote the =
=E2=80=9Cdistinguished-name=E2=80=9D draft to specify when AFI=3D17 is =
used (not only in a LCAF but by itself), how to terminate the string. I =
could include that reference, but that draft is not a working group =
document.
>>=20
>> So please advise.
>=20
> Currently it says:
>=20
>   Length value n:  length in bytes AFI=3D17 field and the =
null-terminated
>      ASCII string (the last byte of 0 is included).
>=20
> It might make sense to 0 terminate the DN in some cases, but at least
> here we know the string length from the value of n, so I think it
> would be better to drop it here. And as I mentioned, you cannot rely
> on the 0 for parsing, to be on the safe side you would use n anyway.

You want to terminate the string in all cases. Because there are cases =
where AFI=3D17 is not used inside an LCAF encoding. And where there is =
no length to convey the string length. And the Distinguished-Name =
use-case Internet Draft specs this for both LCAF and non-LCAF =
applications.

>>> Section 7
>>> It looks like the table in the IANA considerations doesn't include =
all
>>> the types defined in this document.
>>=20
>> That was done intentionally. The ones that are experimental are not =
in this section 7 list because there is no use-case document for it yet. =
Maybe the chairs can explain this better than me.
>=20
> I think it's still useful. If someone sees the type used, they can
> look it up in the registry. It also helps avoid that someone perhaps
> tries to reuse one of these types in new documents. If you really want
> to use one of the code points for something else in the future, a new
> document could always update the registry.

Did Luigi=E2=80=99s response satisfy your comment?

> BTW, it also makes me wonder if it is worth reserving any LCAF types
> for experiments.

The space is large enough for FCFS.=20

> Regards,
> Stig

See new version enclosed. Let me know when I can post it if you like the =
changes.

Thanks again,
Dino


--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4
Content-Disposition: attachment;
	filename=lcaf-rfcdiff.html
Content-Type: text/html;
	name="lcaf-rfcdiff.html"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" =
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- saved from url=3D(0030)https://tools.ietf.org/rfcdiff -->
<html xmlns=3D"http://www.w3.org/1999/xhtml"><head><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=20
  =20
  <meta http-equiv=3D"Content-Style-Type" content=3D"text/css">=20
  <title>Diff: draft-ietf-lisp-lcaf-14.txt - =
draft-ietf-lisp-lcaf-15.txt</title>=20
  <style type=3D"text/css">=20
    body    { margin: 0.4ex; margin-right: auto; }=20
    tr      { }=20
    td      { white-space: pre; font-family: monospace; vertical-align: =
top; font-size: 0.86em;}=20
    th      { font-size: 0.86em; }=20
    .small  { font-size: 0.6em; font-style: italic; font-family: =
Verdana, Helvetica, sans-serif; }=20
    .left   { background-color: #EEE; }=20
    .right  { background-color: #FFF; }=20
    .diff   { background-color: #CCF; }=20
    .lblock { background-color: #BFB; }=20
    .rblock { background-color: #FF8; }=20
    .insert { background-color: #8FF; }=20
    .delete { background-color: #ACF; }=20
    .void   { background-color: #FFB; }=20
    .cont   { background-color: #EEE; }=20
    .linebr { background-color: #AAA; }=20
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; =
text-align: right; padding: 0 2px; }=20
    .elipsis{ background-color: #AAA; }=20
    .left .cont { background-color: #DDD; }=20
    .right .cont { background-color: #EEE; }=20
    .lblock .cont { background-color: #9D9; }=20
    .rblock .cont { background-color: #DD6; }=20
    .insert .cont { background-color: #0DD; }=20
    .delete .cont { background-color: #8AD; }=20
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px =
0; }=20
    span.hide { display: none; color: #aaa;}    a:hover span { display: =
inline; }    tr.change { background-color: gray; }=20
    tr.change a { text-decoration: none; color: black }=20
  </style>=20
     <script>
var chunk_index =3D 0;
var old_chunk =3D null;

function format_chunk(index) {
    var prefix =3D "diff";
    var str =3D index.toString();
    for (x=3D0; x<(4-str.length); ++x) {
        prefix+=3D'0';
    }
    return prefix + str;
}

function find_chunk(n){
    return document.querySelector('tr[id$=3D"' + n + '"]');
}

function change_chunk(offset) {
    var index =3D chunk_index + offset;
    var new_str;
    var new_chunk;

    new_str =3D format_chunk(index);
    new_chunk =3D find_chunk(new_str);
    if (!new_chunk) {
        return;
    }
    if (old_chunk) {
        old_chunk.style.outline =3D "";
    }
    old_chunk =3D new_chunk;
    old_chunk.style.outline =3D "1px solid red";
    window.location.hash =3D "#" + new_str;
    window.scrollBy(0,-100);
    chunk_index =3D index;
}

document.onkeydown =3D function(e) {
    switch (e.keyCode) {
    case 78:
        change_chunk(1);
        break;
    case 80:
        change_chunk(-1);
        break;
    }
};
   </script>=20
</head>=20
<body>=20
  <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">=20
  <tbody><tr id=3D"part-1" bgcolor=3D"orange"><th></th><th><a =
href=3D"https://tools.ietf.org/rfcdiff?url2=3Ddraft-ietf-lisp-lcaf-14.txt"=
 style=3D"color:#008; text-decoration:none;">&lt;</a>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-lcaf-14.txt" =
style=3D"color:#008">draft-ietf-lisp-lcaf-14.txt</a>&nbsp;</th><th> =
</th><th>&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-ietf-lisp-lcaf-15.txt" =
style=3D"color:#008">draft-ietf-lisp-lcaf-15.txt</a>&nbsp;<a =
href=3D"https://tools.ietf.org/rfcdiff?url1=3Ddraft-ietf-lisp-lcaf-15.txt"=
 style=3D"color:#008; text-decoration:none;">&gt;</a></th><th></th></tr>=20=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Network Working =
Group                                       D. Farinacci</td><td> =
</td><td class=3D"right">Network Working Group                           =
            D. Farinacci</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Internet-Draft    =
                                           lispers.net</td><td> </td><td =
class=3D"right">Internet-Draft                                           =
    lispers.net</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Intended status: =
Experimental                                   D. Meyer</td><td> =
</td><td class=3D"right">Intended status: Experimental                   =
                D. Meyer</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0001"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">Expires: <span =
class=3D"delete">January 20, 2017</span>                                 =
       Brocade</td><td> </td><td class=3D"rblock">Expires: <span =
class=3D"insert">March 23, 2017  </span>                                 =
       Brocade</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
                                           J. Snijders</td><td> </td><td =
class=3D"right">                                                         =
    J. Snijders</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
                                    NTT Communications</td><td> </td><td =
class=3D"right">                                                      =
NTT Communications</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0002"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
                                      <span class=3D"delete">     =
July</span> 19, 2016</td><td> </td><td class=3D"rblock">                 =
                                     <span =
class=3D"insert">September</span> 19, 2016</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">                  =
LISP Canonical Address Format (LCAF)</td><td> </td><td class=3D"right">  =
                LISP Canonical Address Format (LCAF)</td><td =
class=3D"lineno"></td></tr>
      <tr id=3D"diff0003"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">                =
        draft-ietf-lisp-lcaf-1<span class=3D"delete">4</span></td><td> =
</td><td class=3D"rblock">                        =
draft-ietf-lisp-lcaf-1<span class=3D"insert">5</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Abstract</td><td> =
</td><td class=3D"right">Abstract</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This draft =
defines a canonical address format encoding used in LISP</td><td> =
</td><td class=3D"right">   This draft defines a canonical address =
format encoding used in LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   control =
messages and in the encoding of lookup keys for the LISP</td><td> =
</td><td class=3D"right">   control messages and in the encoding of =
lookup keys for the LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Mapping =
Database System.</td><td> </td><td class=3D"right">   Mapping Database =
System.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Requirements =
Language</td><td> </td><td class=3D"right">Requirements Language</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The key words =
"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td =
class=3D"right">   The key words "MUST", "MUST NOT", "REQUIRED", =
"SHALL", "SHALL NOT",</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-2" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> =
page 1, line 41<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-2"><em> page 1, line 41<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are working documents of the Internet =
Engineering</td><td> </td><td class=3D"right">   Internet-Drafts are =
working documents of the Internet Engineering</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Task Force =
(IETF).  Note that other groups may also distribute</td><td> </td><td =
class=3D"right">   Task Force (IETF).  Note that other groups may also =
distribute</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   working =
documents as Internet-Drafts.  The list of current Internet-</td><td> =
</td><td class=3D"right">   working documents as Internet-Drafts.  The =
list of current Internet-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td> </td><td =
class=3D"right">   Drafts is at =
http://datatracker.ietf.org/drafts/current/.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
Internet-Drafts are draft documents valid for a maximum of six =
months</td><td> </td><td class=3D"right">   Internet-Drafts are draft =
documents valid for a maximum of six months</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and may be =
updated, replaced, or obsoleted by other documents at any</td><td> =
</td><td class=3D"right">   and may be updated, replaced, or obsoleted =
by other documents at any</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   time.  It is =
inappropriate to use Internet-Drafts as reference</td><td> </td><td =
class=3D"right">   time.  It is inappropriate to use Internet-Drafts as =
reference</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   material or to =
cite them other than as "work in progress."</td><td> </td><td =
class=3D"right">   material or to cite them other than as "work in =
progress."</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0004"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   This =
Internet-Draft will expire on <span class=3D"delete">January 20</span>, =
2017.</td><td> </td><td class=3D"rblock">   This Internet-Draft will =
expire on <span class=3D"insert">March 23</span>, 2017.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Copyright =
Notice</td><td> </td><td class=3D"right">Copyright Notice</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Copyright (c) =
2016 IETF Trust and the persons identified as the</td><td> </td><td =
class=3D"right">   Copyright (c) 2016 IETF Trust and the persons =
identified as the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   document =
authors.  All rights reserved.</td><td> </td><td class=3D"right">   =
document authors.  All rights reserved.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td =
class=3D"right">   This document is subject to BCP 78 and the IETF =
Trust's Legal</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Provisions =
Relating to IETF Documents</td><td> </td><td class=3D"right">   =
Provisions Relating to IETF Documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
(http://trustee.ietf.org/license-info) in effect on the date of</td><td> =
</td><td class=3D"right">   (http://trustee.ietf.org/license-info) in =
effect on the date of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   publication of =
this document.  Please review these documents</td><td> </td><td =
class=3D"right">   publication of this document.  Please review these =
documents</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-3" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> =
page 2, line 23<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-3"><em> page 2, line 23<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   1.  =
Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   =
3</td><td> </td><td class=3D"right">   1.  Introduction  . . . . . . . . =
. . . . . . . . . . . . . . . .   3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   2.  Definition =
of Terms . . . . . . . . . . . . . . . . . . . . .   4</td><td> </td><td =
class=3D"right">   2.  Definition of Terms . . . . . . . . . . . . . . . =
. . . . . .   4</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   3.  LISP =
Canonical Address Format Encodings . . . . . . . . . . .   5</td><td> =
</td><td class=3D"right">   3.  LISP Canonical Address Format Encodings =
. . . . . . . . . . .   5</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   4.  LISP =
Canonical Address Applications . . . . . . . . . . . . .   7</td><td> =
</td><td class=3D"right">   4.  LISP Canonical Address Applications . . =
. . . . . . . . . . .   7</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.1.  =
Segmentation using LISP . . . . . . . . . . . . . . . . .   7</td><td> =
</td><td class=3D"right">     4.1.  Segmentation using LISP . . . . . . =
. . . . . . . . . . .   7</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.2.  =
Carrying AS Numbers in the Mapping Database . . . . . . .   9</td><td> =
</td><td class=3D"right">     4.2.  Carrying AS Numbers in the Mapping =
Database . . . . . . .   9</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.3.  =
Assigning Geo Coordinates to Locator Addresses  . . . . .  10</td><td> =
</td><td class=3D"right">     4.3.  Assigning Geo Coordinates to Locator =
Addresses  . . . . .  10</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.4.  NAT =
Traversal Scenarios . . . . . . . . . . . . . . . . .  12</td><td> =
</td><td class=3D"right">     4.4.  NAT Traversal Scenarios . . . . . . =
. . . . . . . . . . .  12</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.5.  =
Multicast Group Membership Information  . . . . . . . . .  14</td><td> =
</td><td class=3D"right">     4.5.  Multicast Group Membership =
Information  . . . . . . . . .  14</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0005"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.6.  =
Traffic Engineering using Re-encapsulating Tunnels  . . .  1<span =
class=3D"delete">5</span></td><td> </td><td class=3D"rblock">     4.6.  =
Traffic Engineering using Re-encapsulating Tunnels  . . .  1<span =
class=3D"insert">6</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     4.7.  =
Storing Security Data in the Mapping Database . . . . . .  17</td><td> =
</td><td class=3D"right">     4.7.  Storing Security Data in the Mapping =
Database . . . . . .  17</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0006"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.8.  =
Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  <span =
class=3D"delete">18</span></td><td> </td><td class=3D"rblock">     4.8.  =
Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  <span =
class=3D"insert">19</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.9.  =
Replication List Entries for Multicast Forwarding . . . .  <span =
class=3D"delete">20</span></td><td> </td><td class=3D"rblock">     4.9.  =
Replication List Entries for Multicast Forwarding . . . .  <span =
class=3D"insert">21</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     4.10. =
Applications for AFI List Type  . . . . . . . . . . . . .  <span =
class=3D"delete">21</span></td><td> </td><td class=3D"rblock">     4.10. =
Applications for AFI List Type  . . . . . . . . . . . . .  <span =
class=3D"insert">22</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.1.  =
Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  <span =
class=3D"delete">21</span></td><td> </td><td class=3D"rblock">       =
4.10.1.  Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  <span =
class=3D"insert">22</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.2.  =
Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">22</span></td><td> </td><td class=3D"rblock">       =
4.10.2.  Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">23</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.3.  =
ASCII Names in the Mapping Database  . . . . . . . .  <span =
class=3D"delete">23</span></td><td> </td><td class=3D"rblock">       =
4.10.3.  ASCII Names in the Mapping Database  . . . . . . . .  <span =
class=3D"insert">24</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.4.  =
Using Recursive LISP Canonical Address Encodings . .  <span =
class=3D"delete">24</span></td><td> </td><td class=3D"rblock">       =
4.10.4.  Using Recursive LISP Canonical Address Encodings . .  <span =
class=3D"insert">25</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">       4.10.5.  =
Compatibility Mode Use Case  . . . . . . . . . . . .  <span =
class=3D"delete">25</span></td><td> </td><td class=3D"rblock">       =
4.10.5.  Compatibility Mode Use Case  . . . . . . . . . . . .  <span =
class=3D"insert">26</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   5.  =
Experimental LISP Canonical Address Applications  . . . . . .  <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock">   5.  =
Experimental LISP Canonical Address Applications  . . . . . .  <span =
class=3D"insert">27</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.1.  =
Convey Application Specific Data  . . . . . . . . . . . .  <span =
class=3D"delete">26</span></td><td> </td><td class=3D"rblock">     5.1.  =
Convey Application Specific Data  . . . . . . . . . . . .  <span =
class=3D"insert">27</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.2.  =
Generic Database Mapping Lookups  . . . . . . . . . . . .  <span =
class=3D"delete">27</span></td><td> </td><td class=3D"rblock">     5.2.  =
Generic Database Mapping Lookups  . . . . . . . . . . . .  <span =
class=3D"insert">28</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.3.  PETR =
Admission Control Functionality  . . . . . . . . . .  <span =
class=3D"delete">29</span></td><td> </td><td class=3D"rblock">     5.3.  =
PETR Admission Control Functionality  . . . . . . . . . .  <span =
class=3D"insert">30</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.4.  Data =
Model Encoding . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">30</span></td><td> </td><td class=3D"rblock">     5.4.  =
Data Model Encoding . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">31</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.5.  =
Encoding Key/Value Address Pairs  . . . . . . . . . . . .  <span =
class=3D"delete">31</span></td><td> </td><td class=3D"rblock">     5.5.  =
Encoding Key/Value Address Pairs  . . . . . . . . . . . .  <span =
class=3D"insert">32</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     5.6.  =
Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">32</span></td><td> </td><td class=3D"rblock">     5.6.  =
Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">33</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   6.  Security =
Considerations . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">34</span></td><td> </td><td class=3D"rblock">   6.  =
Security Considerations . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">36</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   7.  IANA =
Considerations . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">34</span></td><td> </td><td class=3D"rblock">   7.  =
IANA Considerations . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">36</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   8.  =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">35</span></td><td> </td><td class=3D"rblock">   8.  =
References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">37</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     8.1.  =
Normative References  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">35</span></td><td> </td><td class=3D"rblock">     8.1.  =
Normative References  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">37</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     8.2.  =
Informative References  . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">36</span></td><td> </td><td class=3D"rblock">     8.2.  =
Informative References  . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">38</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Appendix A.  =
Acknowledgments  . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">37</span></td><td> </td><td class=3D"rblock">   =
Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  <span =
class=3D"insert">39</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Appendix B.  =
Document Change Log  . . . . . . . . . . . . . . . .  <span =
class=3D"delete">38</span></td><td> </td><td class=3D"rblock">   =
Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  <span =
class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.1.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-14.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.1.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-15.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.2.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-13.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.2.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-14.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.3.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-12.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.3.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-13.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.4.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-11.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.4.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-12.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.5.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-10.txt</span>  . =
. . . . . . . .  <span class=3D"delete">38</span></td><td> </td><td =
class=3D"rblock">     B.5.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-11.txt</span>  . . . . . . . . .  =
<span class=3D"insert">40</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.6.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-09.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.6.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-10.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.7.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-08.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.7.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-09.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.8.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-07.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.8.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-08.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.9.  =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-06.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.9.  Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-07.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.10. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-05.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.10. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-06.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.11. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-04.txt</span>  . =
. . . . . . . .  <span class=3D"delete">39</span></td><td> </td><td =
class=3D"rblock">     B.11. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-05.txt</span>  . . . . . . . . .  =
<span class=3D"insert">41</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.12. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-03.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.12. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-04.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.13. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-02.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.13. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-03.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.14. =
Changes to <span class=3D"delete">draft-ietf-lisp-lcaf-01.txt</span>  . =
. . . . . . . .  <span class=3D"delete">40</span></td><td> </td><td =
class=3D"rblock">     B.14. Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-02.txt</span>  . . . . . . . . .  =
<span class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">     B.15. =
Changes to draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  <span =
class=3D"delete">40</span></td><td> </td><td class=3D"rblock">     B.15. =
Changes to <span class=3D"insert">draft-ietf-lisp-lcaf-01.txt  . . . . . =
. . . .  42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Authors' =
Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span =
class=3D"delete">40</span></td><td> </td><td class=3D"rblock"><span =
class=3D"insert">     B.16. Changes to</span> =
draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  <span =
class=3D"insert">42</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   Authors' Addresses  . . . . . . . . . . . . =
. . . . . . . . . . .  <span class=3D"insert">43</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">1.  =
Introduction</td><td> </td><td class=3D"right">1.  Introduction</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The LISP =
architecture and protocols [RFC6830] introduces two new</td><td> =
</td><td class=3D"right">   The LISP architecture and protocols =
[RFC6830] introduces two new</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   numbering =
spaces, Endpoint Identifiers (EIDs) and Routing Locators</td><td> =
</td><td class=3D"right">   numbering spaces, Endpoint Identifiers =
(EIDs) and Routing Locators</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   (RLOCs).  To =
provide flexibility for current and future applications,</td><td> =
</td><td class=3D"right">   (RLOCs).  To provide flexibility for current =
and future applications,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   these values =
can be encoded in LISP control messages using a general</td><td> =
</td><td class=3D"right">   these values can be encoded in LISP control =
messages using a general</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   syntax that =
includes Address Family Identifier (AFI), length, and</td><td> </td><td =
class=3D"right">   syntax that includes Address Family Identifier (AFI), =
length, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   value =
fields.</td><td> </td><td class=3D"right">   value fields.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-4" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> =
page 4, line 28<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-4"><em> page 4, line 28<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td> </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   This document =
describes the currently-defined AFIs the LISP protocol</td><td> </td><td =
class=3D"right">   This document describes the currently-defined AFIs =
the LISP protocol</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   uses along =
with their encodings and introduces the LISP Canonical</td><td> </td><td =
class=3D"right">   uses along with their encodings and introduces the =
LISP Canonical</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address Format =
(LCAF) that can be used to define the LISP-specific</td><td> </td><td =
class=3D"right">   Address Format (LCAF) that can be used to define the =
LISP-specific</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encodings for =
arbitrary AFI values.</td><td> </td><td class=3D"right">   encodings for =
arbitrary AFI values.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">2.  Definition of =
Terms</td><td> </td><td class=3D"right">2.  Definition of Terms</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address Family =
Identifier (AFI):  a term used to describe an address</td><td> </td><td =
class=3D"right">   Address Family Identifier (AFI):  a term used to =
describe an address</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0007"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      encoding =
in a packet.  <span class=3D"delete">There is an address family =
currently</span></td><td> </td><td class=3D"rblock">      encoding in a =
packet.  <span class=3D"insert">Address families are</span> defined for =
IPv4 <span class=3D"insert">and</span></td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"lblock">      defined =
for IPv4 <span class=3D"delete">or IPv6 addresses.</span>  See [AFI] and =
[RFC3232] for</td><td> </td><td class=3D"rblock"><span class=3D"insert"> =
     IPv6.</span>  See [AFI] and [RFC3232] for details.  The reserved =
AFI</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      details.  =
The reserved AFI value of 0 is used in this</td><td> </td><td =
class=3D"rblock">      value of 0 is used in this specification to =
indicate an</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
specification to indicate an unspecified encoded address where =
the</td><td> </td><td class=3D"rblock">      unspecified encoded address =
where the length of the address is 0</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      length of =
the address is 0 bytes following the 16-bit AFI value of</td><td> =
</td><td class=3D"rblock">      bytes following the 16-bit AFI value of =
0.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
0.</td><td> </td><td class=3D"rblock"></td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Unspecified =
Address Format:</td><td> </td><td class=3D"right">   Unspecified Address =
Format:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |            =
AFI =3D 0            |    &lt;nothing follows AFI=3D0&gt;    |</td><td> =
</td><td class=3D"right">   |            AFI =3D 0            |    =
&lt;nothing follows AFI=3D0&gt;    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Endpoint ID =
(EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value</td><td> =
</td><td class=3D"right">   Endpoint ID (EID):   a 32-bit (for IPv4) or =
128-bit (for IPv6) value</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-5" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> =
page 5, line 26<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-5"><em> page 5, line 26<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   IANA has =
assigned AFI value 16387 (0x4003) to the LISP architecture</td><td> =
</td><td class=3D"right">   IANA has assigned AFI value 16387 (0x4003) =
to the LISP architecture</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   and protocols. =
 This specification defines the encoding format of the</td><td> </td><td =
class=3D"right">   and protocols.  This specification defines the =
encoding format of the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   LISP Canonical =
Address (LCA).  This section defines all types for</td><td> </td><td =
class=3D"right">   LISP Canonical Address (LCA).  This section defines =
all types for</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   which an =
initial allocation in the LISP-LCAF registry is requested.</td><td> =
</td><td class=3D"right">   which an initial allocation in the LISP-LCAF =
registry is requested.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   See IANA =
Considerations section for the complete list of such types.</td><td> =
</td><td class=3D"right">   See IANA Considerations section for the =
complete list of such types.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The Address =
Family AFI definitions from [AFI] only allocate code-</td><td> </td><td =
class=3D"right">   The Address Family AFI definitions from [AFI] only =
allocate code-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   points for the =
AFI value itself.  The length of the address or entity</td><td> </td><td =
class=3D"right">   points for the AFI value itself.  The length of the =
address or entity</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   that follows =
is not defined and is implied based on conventional</td><td> </td><td =
class=3D"right">   that follows is not defined and is implied based on =
conventional</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0008"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   experience.  =
<span class=3D"delete">Where</span> the LISP protocol uses <span =
class=3D"delete">LISP Canonical Addresses</span></td><td> </td><td =
class=3D"rblock">   experience.  <span class=3D"insert">When</span> the =
LISP protocol uses <span class=3D"insert">LCAF definitions from =
this</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">   specifically,</span> the address <span =
class=3D"delete">length definitions will be</span> in this</td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   document,</span> the =
<span class=3D"insert">AFI-based</span> address <span =
class=3D"insert">lengths are specified</span> in this</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   <span =
class=3D"delete">specification and take precedent over any</span> other =
<span class=3D"delete">specification.</span></td><td> </td><td =
class=3D"rblock">   <span class=3D"insert">document.  When new LCAF =
definitions are defined in</span> other <span =
class=3D"insert">use-case</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   documents, the =
AFI-based address lengths for any new AFI encoded</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   addresses are =
specified in those documents.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   The first 6 =
bytes of an LISP Canonical Address are followed by a</td><td> </td><td =
class=3D"right">   The first 6 bytes of an LISP Canonical Address are =
followed by a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   variable =
number of fields of variable length:</td><td> </td><td class=3D"right">  =
 variable number of fields of variable length:</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |    Type      =
 |     Rsvd2     |            Length             |</td><td> </td><td =
class=3D"right">   |    Type       |     Rsvd2     |            Length   =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-6" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> =
page 6, line 34<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-6"><em> page 6, line 36<span =
class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 12:  =
Source/Dest Key Type</td><td> </td><td class=3D"right">     Type 12:  =
Source/Dest Key Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 13:  =
Replication List Entry Type</td><td> </td><td class=3D"right">     Type =
13:  Replication List Entry Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 14:  =
JSON Data Model Type</td><td> </td><td class=3D"right">     Type 14:  =
JSON Data Model Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 15:  =
Key/Value Address Pair Type</td><td> </td><td class=3D"right">     Type =
15:  Key/Value Address Pair Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">     Type 16:  =
Encapsulation Format Type</td><td> </td><td class=3D"right">     Type =
16:  Encapsulation Format Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0009"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Rsvd2:  this =
8-bit field is reserved for future use and MUST be</td><td> </td><td =
class=3D"rblock">   Rsvd2:  this <span class=3D"insert">LCAF Type =
dependent</span> 8-bit field is reserved for future</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
transmitted as 0 and ignored on receipt.</td><td> </td><td =
class=3D"rblock">      use and MUST be transmitted as 0 and ignored on =
receipt.  <span class=3D"insert">See</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      specific LCAF =
Type for specific bits not reserved.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length:  this =
16-bit field is in units of bytes and covers all of the</td><td> =
</td><td class=3D"right">   Length:  this 16-bit field is in units of =
bytes and covers all of the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      LISP =
Canonical Address payload, starting and including the byte</td><td> =
</td><td class=3D"right">      LISP Canonical Address payload, starting =
and including the byte</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0010"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      after the =
Length field.  <span class=3D"delete">So any</span> LCAF encoded address =
will have a</td><td> </td><td class=3D"rblock">      after the Length =
field.  <span class=3D"insert">When including the AFI, an</span> LCAF =
encoded</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      minimum =
length of 8 bytes when the Length field is 0.  The 8 bytes</td><td> =
</td><td class=3D"rblock">      address will have a minimum length of 8 =
bytes when the Length</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      include =
the AFI, Flags, Type, Reserved, and Length fields.  When</td><td> =
</td><td class=3D"rblock">      field is 0.  The 8 bytes include the =
AFI, Flags, Type, Reserved,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      the AFI =
is not next to encoded address in a control message, then</td><td> =
</td><td class=3D"rblock">      and Length fields.  When the AFI is not =
next to encoded address in</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      the =
encoded address will have a minimum length of 6 bytes when the</td><td> =
</td><td class=3D"rblock">      a control message, then the encoded =
address will have a minimum</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      Length =
field is 0.  The 6 bytes include the Flags, Type, Reserved,</td><td> =
</td><td class=3D"rblock">      length of 6 bytes when the Length field =
is 0.  The 6 bytes include</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      and =
Length fields.</td><td> </td><td class=3D"rblock">      the Flags, Type, =
Reserved, and Length fields.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC6830] =
states RLOC records are sorted when encoded in control</td><td> </td><td =
class=3D"right">   [RFC6830] states RLOC records are sorted when encoded =
in control</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   messages so =
the locator-set has consistent order across all xTRs for</td><td> =
</td><td class=3D"right">   messages so the locator-set has consistent =
order across all xTRs for</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   a given EID.  =
The sort order is based on sort-key {afi, RLOC-</td><td> </td><td =
class=3D"right">   a given EID.  The sort order is based on sort-key =
{afi, RLOC-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   address}. When =
an RLOC is LCAF encoded, the sort-key is {afi, LCAF-</td><td> </td><td =
class=3D"right">   address}. When an RLOC is LCAF encoded, the sort-key =
is {afi, LCAF-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Type}. =
Therefore, when a locator-set has a mix of AFI records and</td><td> =
</td><td class=3D"right">   Type}. Therefore, when a locator-set has a =
mix of AFI records and</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0011"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   LCAF =
records, <span class=3D"delete">all LCAF records will appear after all =
the AFI records</span>.</td><td> </td><td class=3D"rblock">   LCAF =
records, <span class=3D"insert">they are ordered from smallest to =
largest AFI value</span>.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.  LISP =
Canonical Address Applications</td><td> </td><td class=3D"right">4.  =
LISP Canonical Address Applications</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.1.  =
Segmentation using LISP</td><td> </td><td class=3D"right">4.1.  =
Segmentation using LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When multiple =
organizations inside of a LISP site are using private</td><td> </td><td =
class=3D"right">   When multiple organizations inside of a LISP site are =
using private</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   addresses =
[RFC1918] as EID-prefixes, their address spaces must remain</td><td> =
</td><td class=3D"right">   addresses [RFC1918] as EID-prefixes, their =
address spaces must remain</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   segregated due =
to possible address duplication.  An Instance ID in</td><td> </td><td =
class=3D"right">   segregated due to possible address duplication.  An =
Instance ID in</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   the address =
encoding can aid in making the entire AFI based address</td><td> =
</td><td class=3D"right">   the address encoding can aid in making the =
entire AFI based address</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
unique.</td><td> </td><td class=3D"right">   unique.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-7" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> =
page 13, line 12<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-7"><em> page 13, line =
12<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   MS RLOC =
Address:  this is the address of the Map-Server used in the</td><td> =
</td><td class=3D"right">   MS RLOC Address:  this is the address of the =
Map-Server used in the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      destination =
RLOC of a packet that has flowed through a NAT device.</td><td> </td><td =
class=3D"right">      destination RLOC of a packet that has flowed =
through a NAT device.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Private ETR =
RLOC Address:  this is an address known to be a private</td><td> =
</td><td class=3D"right">   Private ETR RLOC Address:  this is an =
address known to be a private</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      address =
inserted in this LCAF format by a LISP router that resides</td><td> =
</td><td class=3D"right">      address inserted in this LCAF format by a =
LISP router that resides</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      on the =
private side of a NAT device.</td><td> </td><td class=3D"right">      on =
the private side of a NAT device.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   RTR RLOC =
Address:  this is an encapsulation address used by an ITR or</td><td> =
</td><td class=3D"right">   RTR RLOC Address:  this is an encapsulation =
address used by an ITR or</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      PITR which =
resides behind a NAT device.  This address is known to</td><td> </td><td =
class=3D"right">      PITR which resides behind a NAT device.  This =
address is known to</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      have state =
in a NAT device so packets can flow from it to the LISP</td><td> =
</td><td class=3D"right">      have state in a NAT device so packets can =
flow from it to the LISP</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0012"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      ETR =
behind the NAT.  There can be one or more NAT Tunnel Router</td><td> =
</td><td class=3D"rblock">      ETR behind the NAT.  There can be one or =
more NAT <span class=3D"insert">Reencapsulating</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      <span =
class=3D"delete">(NTR)</span> [I-D.ermagan-lisp-nat-traversal] addresses =
supplied in these</td><td> </td><td class=3D"rblock">      Tunnel Router =
<span class=3D"insert">(RTR)</span> [I-D.ermagan-lisp-nat-traversal] =
addresses</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      set of =
fields.  The number of <span class=3D"delete">NTRs</span> encoded is =
determined by the</td><td> </td><td class=3D"rblock">      supplied in =
these set of fields.  The number of <span class=3D"insert">RTRs</span> =
encoded is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      LCAF =
length field.  When there are no <span class=3D"delete">NTRs</span> =
supplied, the <span class=3D"delete">NTR</span></td><td> </td><td =
class=3D"rblock">      determined by the LCAF length field.  When there =
are no <span class=3D"insert">RTRs</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      fields =
can be omitted and reflected by the LCAF length field or an</td><td> =
</td><td class=3D"rblock">      supplied, the <span =
class=3D"insert">RTR</span> fields can be omitted and reflected by the =
LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      AFI of 0 =
can be used to indicate zero <span class=3D"delete">NTRs</span> =
encoded.</td><td> </td><td class=3D"rblock">      length field or an AFI =
of 0 can be used to indicate zero <span =
class=3D"insert">RTRs</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      encoded.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This =
encoding can be used in Info-Request and Info-Reply</td><td> </td><td =
class=3D"right">   Usage: This encoding can be used in Info-Request and =
Info-Reply</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   messages.  The =
mapping system does not store this information.  The</td><td> </td><td =
class=3D"right">   messages.  The mapping system does not store this =
information.  The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   information is =
used by an xTR and Map-Server to convey private and</td><td> </td><td =
class=3D"right">   information is used by an xTR and Map-Server to =
convey private and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   public address =
information when traversing NAT and firewall devices.</td><td> </td><td =
class=3D"right">   public address information when traversing NAT and =
firewall devices.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.5.  Multicast =
Group Membership Information</td><td> </td><td class=3D"right">4.5.  =
Multicast Group Membership Information</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Multicast =
group information can be published in the mapping database.</td><td> =
</td><td class=3D"right">   Multicast group information can be published =
in the mapping database.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   So a lookup on =
an group address EID can return a replication list of</td><td> </td><td =
class=3D"right">   So a lookup on an group address EID can return a =
replication list of</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-8" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> =
page 15, line 11<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-8"><em> page 15, line =
11<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      of =
(Instance-ID, S-prefix, G-prefix).</td><td> </td><td class=3D"right">    =
  of (Instance-ID, S-prefix, G-prefix).</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Source =
MaskLen:  the mask length of the source prefix that follows.</td><td> =
</td><td class=3D"right">   Source MaskLen:  the mask length of the =
source prefix that follows.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Group MaskLen: =
 the mask length of the group prefix that follows.</td><td> </td><td =
class=3D"right">   Group MaskLen:  the mask length of the group prefix =
that follows.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   AFI =3D x:  x =
can be any AFI value from [AFI].  When a specific AFI has</td><td> =
</td><td class=3D"right">   AFI =3D x:  x can be any AFI value from =
[AFI].  When a specific AFI has</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      its own =
encoding of a multicast address, this field must be either</td><td> =
</td><td class=3D"right">      its own encoding of a multicast address, =
this field must be either</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      a group =
address or a broadcast address.</td><td> </td><td class=3D"right">      =
a group address or a broadcast address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0013"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Source/Subnet =
Address  is the source address or prefix for encoding a</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      (S,G) multicast =
entry.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   Group Address  is =
the group address or group prefix for encoding</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      (S,G) or (*,G) =
multicast entries.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This =
encoding can be used in EID records in Map-Requests, Map-</td><td> =
</td><td class=3D"right">   Usage: This encoding can be used in EID =
records in Map-Requests, Map-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Replies, =
Map-Registers, and Map-Notify messages.  When LISP-DDT</td><td> </td><td =
class=3D"right">   Replies, Map-Registers, and Map-Notify messages.  =
When LISP-DDT</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.ietf-lisp-ddt] is used as the mapping system mechanism, =
extended</td><td> </td><td class=3D"right">   [I-D.ietf-lisp-ddt] is =
used as the mapping system mechanism, extended</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   EIDs are used =
in Map-Referral messages.</td><td> </td><td class=3D"right">   EIDs are =
used in Map-Referral messages.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.6.  Traffic =
Engineering using Re-encapsulating Tunnels</td><td> </td><td =
class=3D"right">4.6.  Traffic Engineering using Re-encapsulating =
Tunnels</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   For a given =
EID lookup into the mapping database, this LCAF format</td><td> </td><td =
class=3D"right">   For a given EID lookup into the mapping database, =
this LCAF format</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   can be =
returned to provide a list of locators in an explicit re-</td><td> =
</td><td class=3D"right">   can be returned to provide a list of =
locators in an explicit re-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   encapsulation =
path.  See [I-D.farinacci-lisp-te] for details.</td><td> </td><td =
class=3D"right">   encapsulation path.  See [I-D.farinacci-lisp-te] for =
details.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-9" class=3D"change"><td></td><th><small>skipping to =
change at</small><a href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> =
page 16, line 25<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-9"><em> page 16, line =
31<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
           Reencap Hop 1  ...                    |</td><td> </td><td =
class=3D"right">   |                         Reencap Hop 1  ...          =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
Rsvd3         |L|P|S|           AFI =3D x             |</td><td> =
</td><td class=3D"right">   |           Rsvd3         |L|P|S|           =
AFI =3D x             |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
           Reencap Hop k  ...                    |</td><td> </td><td =
class=3D"right">   |                         Reencap Hop k  ...          =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that follow.</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that =
follow.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0014"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd3:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Lookup bit =
(L):  this is the Lookup bit used to indicate to the user</td><td> =
</td><td class=3D"right">   Lookup bit (L):  this is the Lookup bit used =
to indicate to the user</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      of the ELP =
to not use this address for encapsulation but to look</td><td> </td><td =
class=3D"right">      of the ELP to not use this address for =
encapsulation but to look</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      it up in =
the mapping database system to obtain an encapsulating</td><td> </td><td =
class=3D"right">      it up in the mapping database system to obtain an =
encapsulating</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      RLOC =
address.</td><td> </td><td class=3D"right">      RLOC address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   RLOC-Probe bit =
(P):  this is the RLOC-probe bit which means the</td><td> </td><td =
class=3D"right">   RLOC-Probe bit (P):  this is the RLOC-probe bit which =
means the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Reencap Hop =
allows RLOC-probe messages to be sent to it.  When the</td><td> </td><td =
class=3D"right">      Reencap Hop allows RLOC-probe messages to be sent =
to it.  When the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      R-bit is =
set to 0, RLOC-probes must not be sent.  When a Reencap</td><td> =
</td><td class=3D"right">      R-bit is set to 0, RLOC-probes must not =
be sent.  When a Reencap</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Hop is an =
anycast address then multiple physical Reencap Hops are</td><td> =
</td><td class=3D"right">      Hop is an anycast address then multiple =
physical Reencap Hops are</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      using the =
same RLOC address.  In this case, RLOC-probes are not</td><td> </td><td =
class=3D"right">      using the same RLOC address.  In this case, =
RLOC-probes are not</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-10" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 17, line =
35<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-10"><em> page 18, line =
29<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Locator Address ...     |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Locator =
Address ...     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that start with the Key</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that start =
with the Key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Material =
field.</td><td> </td><td class=3D"right">      Material field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Count:  =
the Key Count field declares the number of Key sections</td><td> =
</td><td class=3D"right">   Key Count:  the Key Count field declares the =
number of Key sections</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      included in =
this LCAF.</td><td> </td><td class=3D"right">      included in this =
LCAF.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0015"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd3:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Algorithm: =
 the Algorithm field identifies the key's</td><td> </td><td =
class=3D"right">   Key Algorithm:  the Algorithm field identifies the =
key's</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
cryptographic algorithm and specifies the format of the Public =
Key</td><td> </td><td class=3D"right">      cryptographic algorithm and =
specifies the format of the Public Key</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0016"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">Rsvd4:  this field =
is reserved for future use and MUST be transmitted</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      as 0 and ignored =
on receipt.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   R bit:  this =
is the revoke bit and, if set, it specifies that this</td><td> </td><td =
class=3D"right">   R bit:  this is the revoke bit and, if set, it =
specifies that this</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Key is =
being Revoked.</td><td> </td><td class=3D"right">      Key is being =
Revoked.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Length:  =
this field determines the length in bytes of the Key</td><td> </td><td =
class=3D"right">   Key Length:  this field determines the length in =
bytes of the Key</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Material =
field.</td><td> </td><td class=3D"right">      Material field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Material:  =
the Key Material field stores the key material.  The</td><td> </td><td =
class=3D"right">   Key Material:  the Key Material field stores the key =
material.  The</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      format of =
the key material stored depends on the Key Algorithm</td><td> </td><td =
class=3D"right">      format of the key material stored depends on the =
Key Algorithm</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-11" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 21, line =
10<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-11"><em> page 22, line =
10<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Reply =
message.</td><td> </td><td class=3D"right">      Reply message.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This =
encoding can be used in RLOC records in Map-Requests,</td><td> </td><td =
class=3D"right">   Usage: This encoding can be used in RLOC records in =
Map-Requests,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Map-Replies, =
Map-Registers, and Map-Notify messages.</td><td> </td><td class=3D"right">=
   Map-Replies, Map-Registers, and Map-Notify messages.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.10.  =
Applications for AFI List Type</td><td> </td><td class=3D"right">4.10.  =
Applications for AFI List Type</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">4.10.1.  Binding =
IPv4 and IPv6 Addresses</td><td> </td><td class=3D"right">4.10.1.  =
Binding IPv4 and IPv6 Addresses</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When header =
translation between IPv4 and IPv6 is desirable a LISP</td><td> </td><td =
class=3D"right">   When header translation between IPv4 and IPv6 is =
desirable a LISP</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0017"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Canonical =
Address can use the AFI List Type to carry <span =
class=3D"delete">multiple</span> AFIs in</td><td> </td><td =
class=3D"rblock">   Canonical Address can use the AFI List Type to carry =
<span class=3D"insert">a variable</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   one LCAF =
AFI.</td><td> </td><td class=3D"rblock"><span class=3D"insert">   number =
of</span> AFIs in one LCAF AFI.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address =
Binding LISP Canonical Address Format:</td><td> </td><td class=3D"right"> =
  Address Binding LISP Canonical Address Format:</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D 1 =
   |     Rsvd2     |         2 + 4 + 2 + 16        |</td><td> </td><td =
class=3D"right">   |   Type =3D 1    |     Rsvd2     |         2 + 4 + 2 =
+ 16        |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-12" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 28, line =
5<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-12"><em> page 29, line =
5<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D 6 =
   |     Rsvd2     |             3 + n             |</td><td> </td><td =
class=3D"right">   |   Type =3D 6    |     Rsvd2     |             3 + n =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   | Key Field =
Num |      Key Wildcard Fields      |   Key . . .   |</td><td> </td><td =
class=3D"right">   | Key Field Num |      Key Wildcard Fields      |   =
Key . . .   |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
         . . . Key                               |</td><td> </td><td =
class=3D"right">   |                       . . . Key                     =
          |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of the type's payload.  The value n</td><td> =
</td><td class=3D"right">   Length value n:  length in bytes of the =
type's payload.  The value n</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      is the =
number of bytes that follow this Length field.</td><td> </td><td =
class=3D"right">      is the number of bytes that follow this Length =
field.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0018"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Key Field =
Num:  the number of <span class=3D"delete">fields (minus 1)</span> the =
<span class=3D"delete">key</span> can be broken</td><td> </td><td =
class=3D"rblock">   Key Field Num:  the <span class=3D"insert">value of =
this field is the the</span> number of <span =
class=3D"insert">"Key"</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      up into.  =
The width of the <span class=3D"delete">fields</span> are fixed length.  =
So for a key</td><td> </td><td class=3D"rblock"><span class=3D"insert">  =
    sub-fields minus 1,</span> the <span class=3D"insert">"Key" =
field</span> can be broken up into.  <span class=3D"insert">So =
if</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      size of 8 =
bytes, with a Key Field Num of <span class=3D"delete">4</span> allows 4 =
<span class=3D"delete">fields</span> of 2</td><td> </td><td =
class=3D"rblock"><span class=3D"insert">      this field has a value of =
0, there is 1 sub-field in the "Key".</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      bytes in =
length.  Allowing for a reasonable number of 16 field</td><td> </td><td =
class=3D"rblock">      The width of the <span =
class=3D"insert">sub-fields</span> are fixed length.  So for a key =
size</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      =
separators, valid values range from 0 to 15.</td><td> </td><td =
class=3D"rblock">      of 8 bytes, with a Key Field Num of <span =
class=3D"insert">3,</span> allows 4 <span =
class=3D"insert">sub-fields</span> of 2</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      bytes <span class=3D"insert">each</span> =
in length.  Allowing for a reasonable number of 16 <span =
class=3D"insert">sub-</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">      field separators, valid values range =
from 0 to 15.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key Wildcard =
Fields:  describes which fields in the key are not used</td><td> =
</td><td class=3D"right">   Key Wildcard Fields:  describes which fields =
in the key are not used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      as part of =
the key lookup.  This wildcard encoding is a bitfield.</td><td> </td><td =
class=3D"right">      as part of the key lookup.  This wildcard encoding =
is a bitfield.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Each bit is =
a don't-care bit for a corresponding field in the key.</td><td> </td><td =
class=3D"right">      Each bit is a don't-care bit for a corresponding =
field in the key.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Bit 0 (the =
low-order bit) in this bitfield corresponds the first</td><td> </td><td =
class=3D"right">      Bit 0 (the low-order bit) in this bitfield =
corresponds the first</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0019"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      field, =
<span class=3D"delete">right-justified</span> in the key, bit 1 the =
second field, and so</td><td> </td><td class=3D"rblock">      field, =
<span class=3D"insert">the low-order field</span> in the key, bit 1 the =
second field, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      on.  When =
a bit is set in the bitfield it is a don't-care bit and</td><td> =
</td><td class=3D"rblock">      so on.  When a bit is set in the =
bitfield it is a don't-care bit</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      should =
not be considered as part of the database lookup.  When the</td><td> =
</td><td class=3D"rblock">      and should not be considered as part of =
the database lookup.  When</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      entire =
16-bits is set to 0, then all bits of the key are used for</td><td> =
</td><td class=3D"rblock">      the entire 16-bits is set to 0, then all =
bits of the key are used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      the =
database lookup.</td><td> </td><td class=3D"rblock">      for the =
database lookup.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Key:  the =
variable length key used to do a LISP Database Mapping</td><td> </td><td =
class=3D"right">   Key:  the variable length key used to do a LISP =
Database Mapping</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0020"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      lookup.  =
The length of the key is the value n <span class=3D"delete">(shown =
above) minus</span></td><td> </td><td class=3D"rblock">      lookup.  =
The length of the key is the value n <span class=3D"insert">(as shown =
above).</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"><span =
class=3D"delete">      3.</span></td><td> </td><td =
class=3D"rblock"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This is =
an experimental type where the usage has not been</td><td> </td><td =
class=3D"right">   Usage: This is an experimental type where the usage =
has not been</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   defined =
yet.</td><td> </td><td class=3D"right">   defined yet.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">5.3.  PETR =
Admission Control Functionality</td><td> </td><td class=3D"right">5.3.  =
PETR Admission Control Functionality</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   When a public =
PETR device wants to verify who is encapsulating to it,</td><td> =
</td><td class=3D"right">   When a public PETR device wants to verify =
who is encapsulating to it,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   it can check =
for a specific nonce value in the LISP encapsulated</td><td> </td><td =
class=3D"right">   it can check for a specific nonce value in the LISP =
encapsulated</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   packet.  To =
convey the nonce to admitted ITRs or PITRs, this LCAF</td><td> </td><td =
class=3D"right">   packet.  To convey the nonce to admitted ITRs or =
PITRs, this LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   format is used =
in a Map-Register or Map-Reply locator-record.</td><td> </td><td =
class=3D"right">   format is used in a Map-Register or Map-Reply =
locator-record.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-13" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 30, line =
24<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-13"><em> page 31, line =
24<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D =
14   |    Rsvd2    |B|             2 + n             |</td><td> </td><td =
class=3D"right">   |   Type =3D 14   |    Rsvd2    |B|             2 + n =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
JSON length         | JSON binary/text encoding ... |</td><td> </td><td =
class=3D"right">   |           JSON length         | JSON binary/text =
encoding ... |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Optional Address ...    |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Optional =
Address ...    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0021"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   Length value =
n:  length in bytes of fields that <span =
class=3D"delete">follow.</span></td><td> </td><td class=3D"rblock">   =
Length value n:  length in bytes of <span class=3D"insert">the</span> =
fields that <span class=3D"insert">follow the "JSON</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      length" =
field.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Rsvd{1,2}:  =
must be set to zero and ignore on receipt.</td><td> </td><td =
class=3D"right">   Rsvd{1,2}:  must be set to zero and ignore on =
receipt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   B bit:  =
indicates that the JSON field is binary encoded according to</td><td> =
</td><td class=3D"right">   B bit:  indicates that the JSON field is =
binary encoded according to</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
[JSON-BINARY] when the bit is set to 1.  Otherwise the encoding =
is</td><td> </td><td class=3D"right">      [JSON-BINARY] when the bit is =
set to 1.  Otherwise the encoding is</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      based on =
text encoding according to [RFC7159].</td><td> </td><td class=3D"right"> =
     based on text encoding according to [RFC7159].</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   JSON length:  =
length in octets of the following 'JSON binary/text</td><td> </td><td =
class=3D"right">   JSON length:  length in octets of the following 'JSON =
binary/text</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      encoding' =
field.</td><td> </td><td class=3D"right">      encoding' field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-14" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-14"><em> page 31, line =
26<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-14"><em> page 32, line =
26<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0             =
      1                   2                   3</td><td> </td><td =
class=3D"right">    0                   1                   2            =
       3</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">    0 1 2 3 4 5 6 =
7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1</td><td> </td><td =
class=3D"right">    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 =
6 7 8 9 0 1</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |           =
AFI =3D 16387         |     Rsvd1     |     Flags     |</td><td> =
</td><td class=3D"right">   |           AFI =3D 16387         |     =
Rsvd1     |     Flags     |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |   Type =3D =
15   |     Rsvd2     |               n               |</td><td> </td><td =
class=3D"right">   |   Type =3D 15   |     Rsvd2     |               n   =
            |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   |              =
AFI =3D x          |       Address as Key ...      |</td><td> </td><td =
class=3D"right">   |              AFI =3D x          |       Address as =
Key ...      |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr id=3D"diff0022"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   |            =
  AFI =3D <span class=3D"delete">x</span>          |       Address as =
Value ...    |</td><td> </td><td class=3D"rblock">   |              AFI =
=3D <span class=3D"insert">y</span>          |       Address as Value =
...    |</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td>=
 </td><td class=3D"right">   =
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Length value =
n:  length in bytes of fields that follow.</td><td> </td><td =
class=3D"right">   Length value n:  length in bytes of fields that =
follow.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Rsvd{1,2}:  =
must be set to zero and ignore on receipt.</td><td> </td><td =
class=3D"right">   Rsvd{1,2}:  must be set to zero and ignore on =
receipt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0023"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">   AFI =3D x:  =
x can <span class=3D"delete">be</span> any <span =
class=3D"delete">AFI</span> value from [AFI].  A specific AFI has =
its</td><td> </td><td class=3D"rblock">   AFI =3D x:  x <span =
class=3D"insert">is the "Address as Key" AFI that</span> can <span =
class=3D"insert">have</span> any value from</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      own =
encoding of either a unicast or multicast locator address.</td><td> =
</td><td class=3D"rblock">      [AFI].  A specific AFI has its own =
encoding of either a unicast or</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      All =
RTR/ETR entries for the same level should be combined together</td><td> =
</td><td class=3D"rblock">      multicast locator address.  All RTR/ETR =
entries for the same level</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      by a =
Map-Server to avoid searching through the entire multi-level</td><td> =
</td><td class=3D"rblock">      should be combined together by a =
Map-Server to avoid searching</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">      list of =
locator entries in a <span class=3D"delete">Map-Reply</span> =
message.</td><td> </td><td class=3D"rblock">      through the entire =
multi-level list of locator entries in a <span =
class=3D"insert">Map-</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      Reply</span> =
message.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address as =
Key:  this AFI encoded address will be attached with the</td><td> =
</td><td class=3D"right">   Address as Key:  this AFI encoded address =
will be attached with the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      attributes =
encoded in "Address as Value" which follows this field.</td><td> =
</td><td class=3D"right">      attributes encoded in "Address as Value" =
which follows this field.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0024"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">   <span class=3D"insert">AFI =3D y:  y is the =
"Address of Value" AFI that can have any value</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      from [AFI].  A =
specific AFI has its own encoding of either a</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      unicast or =
multicast locator address.  All RTR/ETR entries for the</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      same level should =
be combined together by a Map-Server to avoid</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      searching through =
the entire multi-level list of locator entries</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">      in a Map-Reply =
message.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock">                                               =
                          </td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Address as =
Value:  this AFI encoded address will be the attribute</td><td> </td><td =
class=3D"right">   Address as Value:  this AFI encoded address will be =
the attribute</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      address =
that goes along with "Address as Key" which precedes this</td><td> =
</td><td class=3D"right">      address that goes along with "Address as =
Key" which precedes this</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
field.</td><td> </td><td class=3D"right">      field.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Usage: This is =
an experimental type where the usage has not been</td><td> </td><td =
class=3D"right">   Usage: This is an experimental type where the usage =
has not been</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   defined =
yet.</td><td> </td><td class=3D"right">   defined yet.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">5.6.  Multiple =
Data-Planes</td><td> </td><td class=3D"right">5.6.  Multiple =
Data-Planes</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Overlays are =
becoming popular in many parts of the network which have</td><td> =
</td><td class=3D"right">   Overlays are becoming popular in many parts =
of the network which have</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-15" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-15"><em> page 36, line =
19<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-15"><em> page 38, line =
19<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.coras-lisp-re]</td><td> </td><td class=3D"right">   =
[I-D.coras-lisp-re]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Coras, F., Cabellos-Aparicio, A., Domingo-Pascual, J.,</td><td> </td><td =
class=3D"right">              Coras, F., Cabellos-Aparicio, A., =
Domingo-Pascual, J.,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Maino, F., and D. Farinacci, "LISP Replication</td><td> </td><td =
class=3D"right">              Maino, F., and D. Farinacci, "LISP =
Replication</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Engineering", draft-coras-lisp-re-08 (work in progress),</td><td> =
</td><td class=3D"right">              Engineering", =
draft-coras-lisp-re-08 (work in progress),</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
November 2015.</td><td> </td><td class=3D"right">              November =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.ermagan-lisp-nat-traversal]</td><td> </td><td class=3D"right">   =
[I-D.ermagan-lisp-nat-traversal]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Ermagan, V., Farinacci, D., Lewis, D., Skriver, J., Maino,</td><td> =
</td><td class=3D"right">              Ermagan, V., Farinacci, D., =
Lewis, D., Skriver, J., Maino,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              F., =
and C. White, "NAT traversal for LISP", draft-ermagan-</td><td> </td><td =
class=3D"right">              F., and C. White, "NAT traversal for =
LISP", draft-ermagan-</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0025"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
lisp-nat-traversal-1<span class=3D"delete">0 (work in progress), =
February</span> 2016.</td><td> </td><td class=3D"rblock">              =
lisp-nat-traversal-1<span class=3D"insert">1 (work in progress), =
August</span> 2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.farinacci-lisp-te]</td><td> </td><td class=3D"right">   =
[I-D.farinacci-lisp-te]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Farinacci, D., Kowal, M., and P. Lahiri, "LISP Traffic</td><td> </td><td =
class=3D"right">              Farinacci, D., Kowal, M., and P. Lahiri, =
"LISP Traffic</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0026"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
Engineering Use-Cases", <span =
class=3D"delete">draft-farinacci-lisp-te-10</span> (work</td><td> =
</td><td class=3D"rblock">              Engineering Use-Cases", <span =
class=3D"insert">draft-farinacci-lisp-te-11</span> (work</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
in progress), <span class=3D"delete">March</span> 2016.</td><td> =
</td><td class=3D"rblock">              in progress), <span =
class=3D"insert">September</span> 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.gross-geneve]</td><td> </td><td class=3D"right">   =
[I-D.gross-geneve]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Gross, J., Sridhar, T., Garg, P., Wright, C., Ganga, I.,</td><td> =
</td><td class=3D"right">              Gross, J., Sridhar, T., Garg, P., =
Wright, C., Ganga, I.,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Agarwal, P., Duda, K., Dutt, D., and J. Hudson, "Geneve:</td><td> =
</td><td class=3D"right">              Agarwal, P., Duda, K., Dutt, D., =
and J. Hudson, "Geneve:</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Generic Network Virtualization Encapsulation", draft-</td><td> </td><td =
class=3D"right">              Generic Network Virtualization =
Encapsulation", draft-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
gross-geneve-02 (work in progress), October 2014.</td><td> </td><td =
class=3D"right">              gross-geneve-02 (work in progress), =
October 2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.herbert-gue]</td><td> </td><td class=3D"right">   =
[I-D.herbert-gue]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Herbert, T., Yong, L., and O. Zia, "Generic UDP</td><td> </td><td =
class=3D"right">              Herbert, T., Yong, L., and O. Zia, =
"Generic UDP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Encapsulation", draft-herbert-gue-03 (work in progress),</td><td> =
</td><td class=3D"right">              Encapsulation", =
draft-herbert-gue-03 (work in progress),</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
March 2015.</td><td> </td><td class=3D"right">              March =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.ietf-lisp-ddt]</td><td> </td><td class=3D"right">   =
[I-D.ietf-lisp-ddt]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Fuller, V., Lewis, D., Ermagan, V., Jain, A., and A.</td><td> </td><td =
class=3D"right">              Fuller, V., Lewis, D., Ermagan, V., Jain, =
A., and A.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Smirnov, "LISP Delegated Database Tree", draft-ietf-lisp-</td><td> =
</td><td class=3D"right">              Smirnov, "LISP Delegated Database =
Tree", draft-ietf-lisp-</td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0027"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">              =
ddt-0<span class=3D"delete">7 (work in progress), May</span> =
2016.</td><td> </td><td class=3D"rblock">              ddt-0<span =
class=3D"insert">8 (work in progress), September</span> 2016.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.portoles-lisp-eid-mobility]</td><td> </td><td class=3D"right">   =
[I-D.portoles-lisp-eid-mobility]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino,</td><td> =
</td><td class=3D"right">              Portoles-Comeras, M., Ashtaputre, =
V., Moreno, V., Maino,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              F., =
and D. Farinacci, "LISP L2/L3 EID Mobility Using a</td><td> </td><td =
class=3D"right">              F., and D. Farinacci, "LISP L2/L3 EID =
Mobility Using a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Unified Control Plane", draft-portoles-lisp-eid-</td><td> </td><td =
class=3D"right">              Unified Control Plane", =
draft-portoles-lisp-eid-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
mobility-00 (work in progress), April 2016.</td><td> </td><td =
class=3D"right">              mobility-00 (work in progress), April =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
[I-D.quinn-vxlan-gpe]</td><td> </td><td class=3D"right">   =
[I-D.quinn-vxlan-gpe]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Quinn, P., Manur, R., Kreeger, L., Lewis, D., Maino, F.,</td><td> =
</td><td class=3D"right">              Quinn, P., Manur, R., Kreeger, =
L., Lewis, D., Maino, F.,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">              =
Smith, M., Agarwal, P., Yong, L., Xu, X., Elzur, U., Garg,</td><td> =
</td><td class=3D"right">              Smith, M., Agarwal, P., Yong, L., =
Xu, X., Elzur, U., Garg,</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"part-16" class=3D"change"><td></td><th><small>skipping =
to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-16"><em> page 38, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><th> =
</th><th><small>skipping to change at</small><a =
href=3D"https://tools.ietf.org/rfcdiff#part-16"><em> page 40, line =
9<span class=3D"hide"> =C2=B6</span></em></a></th><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Thanks goes to =
Michiel Blokzijl and Alberto Rodriguez-Natal for</td><td> </td><td =
class=3D"right">   Thanks goes to Michiel Blokzijl and Alberto =
Rodriguez-Natal for</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   suggesting new =
LCAF types.</td><td> </td><td class=3D"right">   suggesting new LCAF =
types.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Thanks also =
goes to Terry Manderson for assistance obtaining a LISP</td><td> =
</td><td class=3D"right">   Thanks also goes to Terry Manderson for =
assistance obtaining a LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   AFI value from =
IANA.</td><td> </td><td class=3D"right">   AFI value from IANA.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Appendix B.  =
Document Change Log</td><td> </td><td class=3D"right">Appendix B.  =
Document Change Log</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   [RFC Editor: =
Please delete this section on publication as RFC.]</td><td> </td><td =
class=3D"right">   [RFC Editor: Please delete this section on =
publication as RFC.]</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0028"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1.  Changes =
to draft-ietf-lisp-lcaf-14.txt</td><td> </td><td class=3D"rblock">B.1.  =
Changes to <span =
class=3D"insert">draft-ietf-lisp-lcaf-15.txt</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Submitted =
September 2016.</span></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">   o  Addressed =
comments from Routing Directorate reviewer Stig Venass.</span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert"></span></td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock"></td><td> =
</td><td class=3D"rblock"><span class=3D"insert">B.2.  Changes to</span> =
draft-ietf-lisp-lcaf-14.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
July 2016.</td><td> </td><td class=3D"right">   o  Submitted July =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix IDnits =
errors and comments from Luigi Iannone, document</td><td> </td><td =
class=3D"right">   o  Fix IDnits errors and comments from Luigi Iannone, =
document</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
shepherd.</td><td> </td><td class=3D"right">      shepherd.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0029"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">2</span>.  Changes to =
draft-ietf-lisp-lcaf-13.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">3</span>.  Changes to =
draft-ietf-lisp-lcaf-13.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
May 2016.</td><td> </td><td class=3D"right">   o  Submitted May =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Explain the =
Instance-ID LCAF Type is 32-bits in length and the</td><td> </td><td =
class=3D"right">   o  Explain the Instance-ID LCAF Type is 32-bits in =
length and the</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Instance-ID =
field in the LISP encapsulation header is 24-bits.</td><td> </td><td =
class=3D"right">      Instance-ID field in the LISP encapsulation header =
is 24-bits.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0030"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">3</span>.  Changes to =
draft-ietf-lisp-lcaf-12.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">4</span>.  Changes to =
draft-ietf-lisp-lcaf-12.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
March 2016.</td><td> </td><td class=3D"right">   o  Submitted March =
2016.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Updated =
references and document timer.</td><td> </td><td class=3D"right">   o  =
Updated references and document timer.</td><td class=3D"lineno"></td></tr>=

      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Removed the =
R, J, and L bits from the Multicast Info Type LCAF</td><td> </td><td =
class=3D"right">   o  Removed the R, J, and L bits from the Multicast =
Info Type LCAF</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      since =
working group decided to not go forward with draft-</td><td> </td><td =
class=3D"right">      since working group decided to not go forward with =
draft-</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
farinacci-lisp-mr-signaling-03.txt in favor of draft- =
ietf-lisp-</td><td> </td><td class=3D"right">      =
farinacci-lisp-mr-signaling-03.txt in favor of draft- ietf-lisp-</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      =
signal-free-00.txt.</td><td> </td><td class=3D"right">      =
signal-free-00.txt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0031"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">4</span>.  Changes to =
draft-ietf-lisp-lcaf-11.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">5</span>.  Changes to =
draft-ietf-lisp-lcaf-11.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
September 2015.</td><td> </td><td class=3D"right">   o  Submitted =
September 2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Reflecting =
comments from Prague LISP working group.</td><td> </td><td =
class=3D"right">   o  Reflecting comments from Prague LISP working =
group.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Readying =
document for a LISP LCAF registry, RFC publication, and</td><td> =
</td><td class=3D"right">   o  Readying document for a LISP LCAF =
registry, RFC publication, and</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      for new =
use-cases that will be defined in the new charter.</td><td> </td><td =
class=3D"right">      for new use-cases that will be defined in the new =
charter.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0032"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">5</span>.  Changes to =
draft-ietf-lisp-lcaf-10.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">6</span>.  Changes to =
draft-ietf-lisp-lcaf-10.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
June 2015.</td><td> </td><td class=3D"right">   o  Submitted June =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix =
coauthor Job's contact information.</td><td> </td><td class=3D"right">   =
o  Fix coauthor Job's contact information.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0033"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">6</span>.  Changes to =
draft-ietf-lisp-lcaf-09.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">7</span>.  Changes to =
draft-ietf-lisp-lcaf-09.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
June 2015.</td><td> </td><td class=3D"right">   o  Submitted June =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix IANA =
Considerations section to request a registry to allocate</td><td> =
</td><td class=3D"right">   o  Fix IANA Considerations section to =
request a registry to allocate</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      and track =
LCAF Type values.</td><td> </td><td class=3D"right">      and track LCAF =
Type values.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0034"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">7</span>.  Changes to =
draft-ietf-lisp-lcaf-08.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">8</span>.  Changes to =
draft-ietf-lisp-lcaf-08.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
April 2015.</td><td> </td><td class=3D"right">   o  Submitted April =
2015.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Comment =
from Florin.  The Application Data Type length field has a</td><td> =
</td><td class=3D"right">   o  Comment from Florin.  The Application =
Data Type length field has a</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      typo.  The =
field should be labeled "12 + n" and not "8 + n".</td><td> </td><td =
class=3D"right">      typo.  The field should be labeled "12 + n" and =
not "8 + n".</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Fix length =
fields in the sections titled "Using Recursive LISP</td><td> </td><td =
class=3D"right">   o  Fix length fields in the sections titled "Using =
Recursive LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      Canonical =
Address Encodings", "Generic Database Mapping Lookups",</td><td> =
</td><td class=3D"right">      Canonical Address Encodings", "Generic =
Database Mapping Lookups",</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      and "Data =
Model Encoding".</td><td> </td><td class=3D"right">      and "Data Model =
Encoding".</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0035"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">8</span>.  Changes to =
draft-ietf-lisp-lcaf-07.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">9</span>.  Changes to =
draft-ietf-lisp-lcaf-07.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
December 2014.</td><td> </td><td class=3D"right">   o  Submitted =
December 2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a new =
LCAF Type called "Encapsulation Format" so decapsulating</td><td> =
</td><td class=3D"right">   o  Add a new LCAF Type called "Encapsulation =
Format" so decapsulating</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      xTRs can =
inform encapsulating xTRs what data-plane encapsulations</td><td> =
</td><td class=3D"right">      xTRs can inform encapsulating xTRs what =
data-plane encapsulations</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      they =
support.</td><td> </td><td class=3D"right">      they support.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0036"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.<span =
class=3D"delete">9</span>.  Changes to =
draft-ietf-lisp-lcaf-06.txt</td><td> </td><td class=3D"rblock">B.<span =
class=3D"insert">10</span>.  Changes to =
draft-ietf-lisp-lcaf-06.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
October 2014.</td><td> </td><td class=3D"right">   o  Submitted October =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Make it =
clear how sorted RLOC records are done when LCAFs are used</td><td> =
</td><td class=3D"right">   o  Make it clear how sorted RLOC records are =
done when LCAFs are used</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      as the RLOC =
record.</td><td> </td><td class=3D"right">      as the RLOC =
record.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0037"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">0</span>.  Changes to =
draft-ietf-lisp-lcaf-05.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">1</span>.  Changes to =
draft-ietf-lisp-lcaf-05.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
May 2014.</td><td> </td><td class=3D"right">   o  Submitted May =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a =
length field of the JSON payload that can be used for either</td><td> =
</td><td class=3D"right">   o  Add a length field of the JSON payload =
that can be used for either</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      binary or =
text encoding of JSON data.</td><td> </td><td class=3D"right">      =
binary or text encoding of JSON data.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0038"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">1</span>.  Changes to =
draft-ietf-lisp-lcaf-04.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">2</span>.  Changes to =
draft-ietf-lisp-lcaf-04.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
January 2014.</td><td> </td><td class=3D"right">   o  Submitted January =
2014.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Agreement =
among ELP implementors to have the AFI 16-bit field</td><td> </td><td =
class=3D"right">   o  Agreement among ELP implementors to have the AFI =
16-bit field</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      adjacent to =
the address.  This will make the encoding consistent</td><td> </td><td =
class=3D"right">      adjacent to the address.  This will make the =
encoding consistent</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      with all =
other LCAF type address encodings.</td><td> </td><td class=3D"right">    =
  with all other LCAF type address encodings.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0039"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">2</span>.  Changes to =
draft-ietf-lisp-lcaf-03.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">3</span>.  Changes to =
draft-ietf-lisp-lcaf-03.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
September 2013.</td><td> </td><td class=3D"right">   o  Submitted =
September 2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Updated =
references and author's affilations.</td><td> </td><td class=3D"right">  =
 o  Updated references and author's affilations.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added =
Instance-ID to the Multicast Info Type so there is relative</td><td> =
</td><td class=3D"right">   o  Added Instance-ID to the Multicast Info =
Type so there is relative</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      ease in =
parsing (S,G) entries within a VPN.</td><td> </td><td class=3D"right">   =
   ease in parsing (S,G) entries within a VPN.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add port =
range encodings to the Application Data LCAF Type.</td><td> </td><td =
class=3D"right">   o  Add port range encodings to the Application Data =
LCAF Type.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add a new =
JSON LCAF Type.</td><td> </td><td class=3D"right">   o  Add a new JSON =
LCAF Type.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Add Address =
Key/Value LCAF Type to allow attributes to be attached</td><td> </td><td =
class=3D"right">   o  Add Address Key/Value LCAF Type to allow =
attributes to be attached</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      to an =
address.</td><td> </td><td class=3D"right">      to an address.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0040"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">3</span>.  Changes to =
draft-ietf-lisp-lcaf-02.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">4</span>.  Changes to =
draft-ietf-lisp-lcaf-02.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
March 2013.</td><td> </td><td class=3D"right">   o  Submitted March =
2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added new =
LCAF Type "Replication List Entry" to support LISP</td><td> </td><td =
class=3D"right">   o  Added new LCAF Type "Replication List Entry" to =
support LISP</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">      replication =
engineering use-cases.</td><td> </td><td class=3D"right">      =
replication engineering use-cases.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Changed =
references to new LISP RFCs.</td><td> </td><td class=3D"right">   o  =
Changed references to new LISP RFCs.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0041"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">4</span>.  Changes to =
draft-ietf-lisp-lcaf-01.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">5</span>.  Changes to =
draft-ietf-lisp-lcaf-01.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Submitted =
January 2013.</td><td> </td><td class=3D"right">   o  Submitted January =
2013.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Change =
longitude range from 0-90 to 0-180 in section 4.4.</td><td> </td><td =
class=3D"right">   o  Change longitude range from 0-90 to 0-180 in =
section 4.4.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Added =
reference to WGS-84 in section 4.4.</td><td> </td><td class=3D"right">   =
o  Added reference to WGS-84 in section 4.4.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr id=3D"diff0042"><td></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"lblock">B.1<span =
class=3D"delete">5</span>.  Changes to =
draft-ietf-lisp-lcaf-00.txt</td><td> </td><td class=3D"rblock">B.1<span =
class=3D"insert">6</span>.  Changes to =
draft-ietf-lisp-lcaf-00.txt</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  Posted =
first working group draft August 2012.</td><td> </td><td class=3D"right"> =
  o  Posted first working group draft August 2012.</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   o  This draft =
was renamed from draft-farinacci-lisp-lcaf-10.txt.</td><td> </td><td =
class=3D"right">   o  This draft was renamed from =
draft-farinacci-lisp-lcaf-10.txt.</td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">Authors' =
Addresses</td><td> </td><td class=3D"right">Authors' Addresses</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left"></td><td> =
</td><td class=3D"right"></td><td class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   Dino =
Farinacci</td><td> </td><td class=3D"right">   Dino Farinacci</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   =
lispers.net</td><td> </td><td class=3D"right">   lispers.net</td><td =
class=3D"lineno"></td></tr>
      <tr><td class=3D"lineno"></td><td class=3D"left">   San Jose, =
CA</td><td> </td><td class=3D"right">   San Jose, CA</td><td =
class=3D"lineno"></td></tr>

     <tr><td></td><td class=3D"left"></td><td> </td><td =
class=3D"right"></td><td></td></tr>
     <tr id=3D"end" bgcolor=3D"gray"><th colspan=3D"5" =
align=3D"center">&nbsp;End of changes. 42 change blocks.&nbsp;</th></tr>
     <tr class=3D"stats"><td></td><th><i>108 lines changed or =
deleted</i></th><th><i> </i></th><th><i>143 lines changed or =
added</i></th><td></td></tr>
     <tr><td colspan=3D"5" align=3D"center" class=3D"small"><br>This =
html diff was produced by rfcdiff 1.45. The latest version is available =
from <a =
href=3D"http://www.tools.ietf.org/tools/rfcdiff/">http://tools.ietf.org/to=
ols/rfcdiff/</a> </td></tr>
   </tbody></table>
  =20
  =20
</body></html>=

--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii




--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4
Content-Disposition: attachment;
	filename=draft-ietf-lisp-lcaf-15.txt
Content-Type: text/plain;
	name="draft-ietf-lisp-lcaf-15.txt"
Content-Transfer-Encoding: quoted-printable





Network Working Group                                       D. Farinacci
Internet-Draft                                               lispers.net
Intended status: Experimental                                   D. Meyer
Expires: March 23, 2017                                          Brocade
                                                             J. Snijders
                                                      NTT Communications
                                                      September 19, 2016


                  LISP Canonical Address Format (LCAF)
                        draft-ietf-lisp-lcaf-15

Abstract

   This draft defines a canonical address format encoding used in LISP
   control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on March 23, 2017.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Farinacci, et al.        Expires March 23, 2017                 [Page 1]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Definition of Terms . . . . . . . . . . . . . . . . . . . . .   4
   3.  LISP Canonical Address Format Encodings . . . . . . . . . . .   5
   4.  LISP Canonical Address Applications . . . . . . . . . . . . .   7
     4.1.  Segmentation using LISP . . . . . . . . . . . . . . . . .   7
     4.2.  Carrying AS Numbers in the Mapping Database . . . . . . .   9
     4.3.  Assigning Geo Coordinates to Locator Addresses  . . . . .  10
     4.4.  NAT Traversal Scenarios . . . . . . . . . . . . . . . . .  12
     4.5.  Multicast Group Membership Information  . . . . . . . . .  14
     4.6.  Traffic Engineering using Re-encapsulating Tunnels  . . .  16
     4.7.  Storing Security Data in the Mapping Database . . . . . .  17
     4.8.  Source/Destination 2-Tuple Lookups  . . . . . . . . . . .  19
     4.9.  Replication List Entries for Multicast Forwarding . . . .  21
     4.10. Applications for AFI List Type  . . . . . . . . . . . . .  22
       4.10.1.  Binding IPv4 and IPv6 Addresses  . . . . . . . . . .  22
       4.10.2.  Layer-2 VPNs . . . . . . . . . . . . . . . . . . . .  23
       4.10.3.  ASCII Names in the Mapping Database  . . . . . . . .  24
       4.10.4.  Using Recursive LISP Canonical Address Encodings . .  25
       4.10.5.  Compatibility Mode Use Case  . . . . . . . . . . . .  26
   5.  Experimental LISP Canonical Address Applications  . . . . . .  27
     5.1.  Convey Application Specific Data  . . . . . . . . . . . .  27
     5.2.  Generic Database Mapping Lookups  . . . . . . . . . . . .  28
     5.3.  PETR Admission Control Functionality  . . . . . . . . . .  30
     5.4.  Data Model Encoding . . . . . . . . . . . . . . . . . . .  31
     5.5.  Encoding Key/Value Address Pairs  . . . . . . . . . . . .  32
     5.6.  Multiple Data-Planes  . . . . . . . . . . . . . . . . . .  33
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  36
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  36
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  37
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  37
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  38
   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  39
   Appendix B.  Document Change Log  . . . . . . . . . . . . . . . .  40
     B.1.  Changes to draft-ietf-lisp-lcaf-15.txt  . . . . . . . . .  40
     B.2.  Changes to draft-ietf-lisp-lcaf-14.txt  . . . . . . . . .  40
     B.3.  Changes to draft-ietf-lisp-lcaf-13.txt  . . . . . . . . .  40
     B.4.  Changes to draft-ietf-lisp-lcaf-12.txt  . . . . . . . . .  40
     B.5.  Changes to draft-ietf-lisp-lcaf-11.txt  . . . . . . . . .  40



Farinacci, et al.        Expires March 23, 2017                 [Page 2]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


     B.6.  Changes to draft-ietf-lisp-lcaf-10.txt  . . . . . . . . .  41
     B.7.  Changes to draft-ietf-lisp-lcaf-09.txt  . . . . . . . . .  41
     B.8.  Changes to draft-ietf-lisp-lcaf-08.txt  . . . . . . . . .  41
     B.9.  Changes to draft-ietf-lisp-lcaf-07.txt  . . . . . . . . .  41
     B.10. Changes to draft-ietf-lisp-lcaf-06.txt  . . . . . . . . .  41
     B.11. Changes to draft-ietf-lisp-lcaf-05.txt  . . . . . . . . .  41
     B.12. Changes to draft-ietf-lisp-lcaf-04.txt  . . . . . . . . .  42
     B.13. Changes to draft-ietf-lisp-lcaf-03.txt  . . . . . . . . .  42
     B.14. Changes to draft-ietf-lisp-lcaf-02.txt  . . . . . . . . .  42
     B.15. Changes to draft-ietf-lisp-lcaf-01.txt  . . . . . . . . .  42
     B.16. Changes to draft-ietf-lisp-lcaf-00.txt  . . . . . . . . .  42
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  43

1.  Introduction

   The LISP architecture and protocols [RFC6830] introduces two new
   numbering spaces, Endpoint Identifiers (EIDs) and Routing Locators
   (RLOCs).  To provide flexibility for current and future applications,
   these values can be encoded in LISP control messages using a general
   syntax that includes Address Family Identifier (AFI), length, and
   value fields.

   Currently defined AFIs include IPv4 and IPv6 addresses, which are
   formatted according to code-points assigned in [AFI] as follows:

   IPv4 Encoded Address:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

















Farinacci, et al.        Expires March 23, 2017                 [Page 3]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   IPv6 Encoded Address:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 2            |       IPv6 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv6 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   This document describes the currently-defined AFIs the LISP protocol
   uses along with their encodings and introduces the LISP Canonical
   Address Format (LCAF) that can be used to define the LISP-specific
   encodings for arbitrary AFI values.

2.  Definition of Terms

   Address Family Identifier (AFI):  a term used to describe an address
      encoding in a packet.  Address families are defined for IPv4 and
      IPv6.  See [AFI] and [RFC3232] for details.  The reserved AFI
      value of 0 is used in this specification to indicate an
      unspecified encoded address where the length of the address is 0
      bytes following the 16-bit AFI value of 0.

   Unspecified Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 0            |    <nothing follows AFI=3D0>    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Endpoint ID (EID):   a 32-bit (for IPv4) or 128-bit (for IPv6) value
      used in the source and destination address fields of the first
      (most inner) LISP header of a packet.  The host obtains a
      destination EID the same way it obtains a destination address
      today, for example through a DNS lookup or SIP exchange.  The
      source EID is obtained via existing mechanisms used to set a
      host's "local" IP address.  An EID is allocated to a host from an
      EID-prefix block associated with the site where the host is
      located.  An EID can be used by a host to refer to other hosts.




Farinacci, et al.        Expires March 23, 2017                 [Page 4]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Routing Locator (RLOC):   the IPv4 or IPv6 address of an egress
      tunnel router (ETR).  It is the output of a EID-to-RLOC mapping
      lookup.  An EID maps to one or more RLOCs.  Typically, RLOCs are
      numbered from topologically aggregatable blocks that are assigned
      to a site at each point to which it attaches to the global
      Internet; where the topology is defined by the connectivity of
      provider networks, RLOCs can be thought of as PA addresses.
      Multiple RLOCs can be assigned to the same ETR device or to
      multiple ETR devices at a site.

3.  LISP Canonical Address Format Encodings

   IANA has assigned AFI value 16387 (0x4003) to the LISP architecture
   and protocols.  This specification defines the encoding format of the
   LISP Canonical Address (LCA).  This section defines all types for
   which an initial allocation in the LISP-LCAF registry is requested.
   See IANA Considerations section for the complete list of such types.

   The Address Family AFI definitions from [AFI] only allocate code-
   points for the AFI value itself.  The length of the address or entity
   that follows is not defined and is implied based on conventional
   experience.  When the LISP protocol uses LCAF definitions from this
   document, the AFI-based address lengths are specified in this
   document.  When new LCAF definitions are defined in other use-case
   documents, the AFI-based address lengths for any new AFI encoded
   addresses are specified in those documents.

   The first 6 bytes of an LISP Canonical Address are followed by a
   variable number of fields of variable length:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Type       |     Rsvd2     |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Rsvd1:  this 8-bit field is reserved for future use and MUST be
      transmitted as 0 and ignored on receipt.

   Flags:  this 8-bit field is for future definition and use.  For now,
      set to zero on transmission and ignored on receipt.

   Type:  this 8-bit field is specific to the LISP Canonical Address
      formatted encodings, currently allocated values are:

     Type 0:  Null Body Type



Farinacci, et al.        Expires March 23, 2017                 [Page 5]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


     Type 1:  AFI List Type

     Type 2:  Instance ID Type

     Type 3:  AS Number Type

     Type 4:  Application Data Type

     Type 5:  Geo Coordinates Type

     Type 6:  Opaque Key Type

     Type 7:  NAT-Traversal Type

     Type 8:  Nonce Locator Type

     Type 9:  Multicast Info Type

     Type 10:  Explicit Locator Path Type

     Type 11:  Security Key Type

     Type 12:  Source/Dest Key Type

     Type 13:  Replication List Entry Type

     Type 14:  JSON Data Model Type

     Type 15:  Key/Value Address Pair Type

     Type 16:  Encapsulation Format Type

   Rsvd2:  this LCAF Type dependent 8-bit field is reserved for future
      use and MUST be transmitted as 0 and ignored on receipt.  See
      specific LCAF Type for specific bits not reserved.

   Length:  this 16-bit field is in units of bytes and covers all of the
      LISP Canonical Address payload, starting and including the byte
      after the Length field.  When including the AFI, an LCAF encoded
      address will have a minimum length of 8 bytes when the Length
      field is 0.  The 8 bytes include the AFI, Flags, Type, Reserved,
      and Length fields.  When the AFI is not next to encoded address in
      a control message, then the encoded address will have a minimum
      length of 6 bytes when the Length field is 0.  The 6 bytes include
      the Flags, Type, Reserved, and Length fields.

   [RFC6830] states RLOC records are sorted when encoded in control
   messages so the locator-set has consistent order across all xTRs for



Farinacci, et al.        Expires March 23, 2017                 [Page 6]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   a given EID.  The sort order is based on sort-key {afi, RLOC-
   address}. When an RLOC is LCAF encoded, the sort-key is {afi, LCAF-
   Type}. Therefore, when a locator-set has a mix of AFI records and
   LCAF records, they are ordered from smallest to largest AFI value.































4.  LISP Canonical Address Applications

4.1.  Segmentation using LISP

   When multiple organizations inside of a LISP site are using private
   addresses [RFC1918] as EID-prefixes, their address spaces must remain
   segregated due to possible address duplication.  An Instance ID in
   the address encoding can aid in making the entire AFI based address
   unique.

   Another use for the Instance ID LISP Canonical Address Format is when
   creating multiple segmented VPNs inside of a LISP site where keeping
   EID-prefix based subnets is desirable.



Farinacci, et al.        Expires March 23, 2017                 [Page 7]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Instance ID LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 2    | IID mask-len  |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Instance ID                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   IID mask-len:  if the AFI is set to 0, then this format is not
      encoding an extended EID-prefix but rather an instance-ID range
      where the 'IID mask-len' indicates the number of high-order bits
      used in the Instance ID field for the range.

   Length value n:  length in bytes of the AFI address that follows the
      Instance ID field including the AFI field itself.

   Instance ID:  the low-order 24-bits that can go into a LISP data
      header when the I-bit is set.  See [RFC6830] for details.  The
      reason for the length difference is so that the maximum number of
      instances supported per mapping system is 2^32 while conserving
      space in the LISP data header.  This comes at the expense of
      limiting the maximum number of instances per xTR to 2^24.  If an
      xTR is configured with multiple instance-IDs where the value in
      the high-order 8 bits are the same, then the low-order 24 bits
      MUST be unique.

   AFI =3D x:  x can be any AFI value from [AFI].

   This LISP Canonical Address Type can be used to encode either EID or
   RLOC addresses.

   Usage: When used as a lookup key, the EID is regarded as a extended-
   EID in the mapping system.  This encoding is used in EID records in
   Map-Requests, Map-Replies, Map-Registers, and Map-Notify messages.
   When LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system
   mechanism, extended EIDs are used in Map-Referral messages.









Farinacci, et al.        Expires March 23, 2017                 [Page 8]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.2.  Carrying AS Numbers in the Mapping Database

   When an AS number is stored in the LISP Mapping Database System for
   either policy or documentation reasons, it can be encoded in a LISP
   Canonical Address.

   AS Number LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 3    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                           AS Number                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      AS Number field including the AFI field itself.

   AS Number:  the 32-bit AS number of the autonomous system that has
      been assigned either the EID or RLOC that follows.

   AFI =3D x:  x can be any AFI value from [AFI].

   The AS Number Canonical Address Type can be used to encode either EID
   or RLOC addresses.  The former is used to describe the LISP-ALT AS
   number the EID-prefix for the site is being carried for.  The latter
   is used to describe the AS that is carrying RLOC based prefixes in
   the underlying routing system.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.













Farinacci, et al.        Expires March 23, 2017                 [Page 9]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.3.  Assigning Geo Coordinates to Locator Addresses

   If an ETR desires to send a Map-Reply describing the Geo Coordinates
   for each locator in its locator-set, it can use the Geo Coordinate
   Type to convey physical location information.

   Coordinates are specified using the WGS-84 (World Geodetic System)
   reference coordinate system [WGS-84].

   Geo Coordinate LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 5    |     Rsvd2     |            12 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |N|     Latitude Degrees        |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |E|     Longitude Degrees       |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                            Altitude                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      8-byte Longitude and Latitude fields including the AFI field
      itself.

   N: When set to 1 means North, otherwise South.

   Latitude Degrees:  Valid values range from 0 to 90 degrees above or
      below the equator (northern or southern hemisphere, respectively).

   Latitude Minutes:  Valid values range from 0 to 59.

   Latitude Seconds:  Valid values range from 0 to 59.

   E: When set to 1 means East, otherwise West.

   Longitude Degrees:  Value values are from 0 to 180 degrees right or
      left of the Prime Meridian.

   Longitude Minutes:  Valid values range from 0 to 59.

   Longitude Seconds:  Valid values range from 0 to 59.



Farinacci, et al.        Expires March 23, 2017                [Page 10]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Altitude:  Height relative to sea level in meters.  This is a signed
      integer meaning that the altitude could be below sea level.  A
      value of 0x7fffffff indicates no Altitude value is encoded.

   AFI =3D x:  x can be any AFI value from [AFI].

   The Geo Coordinates Canonical Address Type can be used to encode
   either EID or RLOC addresses.  When used for EID encodings, you can
   determine the physical location of an EID along with the topological
   location by observing the locator-set.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.




































Farinacci, et al.        Expires March 23, 2017                [Page 11]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.4.  NAT Traversal Scenarios

   When a LISP system is conveying global address and mapped port
   information when traversing through a NAT device, the NAT-Traversal
   LCAF Type is used.  See [I-D.ermagan-lisp-nat-traversal] for details.

   NAT-Traversal Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 7    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       MS UDP Port Number      |      ETR UDP Port Number      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |  Global ETR RLOC Address  ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       MS RLOC Address  ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          | Private ETR RLOC Address  ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |      RTR RLOC Address 1 ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |      RTR RLOC Address k ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI addresses that follows
      the UDP Port Number field including the AFI fields themselves.

   MS UDP Port Number:  this is the UDP port number of the Map-Server
      and is set to 4342.

   ETR UDP Port Number:  this is the port number returned to a LISP
      system which was copied from the source port from a packet that
      has flowed through a NAT device.

   AFI =3D x:  x can be any AFI value from [AFI].

   Global ETR RLOC Address:  this is an address known to be globally
      unique built by NAT-traversal functionality in a LISP router.

   MS RLOC Address:  this is the address of the Map-Server used in the
      destination RLOC of a packet that has flowed through a NAT device.






Farinacci, et al.        Expires March 23, 2017                [Page 12]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Private ETR RLOC Address:  this is an address known to be a private
      address inserted in this LCAF format by a LISP router that resides
      on the private side of a NAT device.

   RTR RLOC Address:  this is an encapsulation address used by an ITR or
      PITR which resides behind a NAT device.  This address is known to
      have state in a NAT device so packets can flow from it to the LISP
      ETR behind the NAT.  There can be one or more NAT Reencapsulating
      Tunnel Router (RTR) [I-D.ermagan-lisp-nat-traversal] addresses
      supplied in these set of fields.  The number of RTRs encoded is
      determined by the LCAF length field.  When there are no RTRs
      supplied, the RTR fields can be omitted and reflected by the LCAF
      length field or an AFI of 0 can be used to indicate zero RTRs
      encoded.

   Usage: This encoding can be used in Info-Request and Info-Reply
   messages.  The mapping system does not store this information.  The
   information is used by an xTR and Map-Server to convey private and
   public address information when traversing NAT and firewall devices.
































Farinacci, et al.        Expires March 23, 2017                [Page 13]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.5.  Multicast Group Membership Information

   Multicast group information can be published in the mapping database.
   So a lookup on an group address EID can return a replication list of
   RLOC group addresses or RLOC unicast addresses.  The intent of this
   type of unicast replication is to deliver packets to multiple ETRs at
   receiver LISP multicast sites.  The locator-set encoding for this EID
   record type can be a list of ETRs when they each register with "Merge
   Semantics".  The encoding can be a typical AFI encoded locator
   address.  When an RTR list is being registered (with multiple levels
   according to [I-D.coras-lisp-re]), the Replication List Entry LCAF
   type is used for locator encoding.

   This LCAF encoding can be used to send broadcast packets to all
   members of a subnet when each EIDs are away from their home subnet
   location.

   Multicast Info Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 9    |     Rsvd2     |             8 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Instance-ID                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            Reserved           | Source MaskLen| Group MaskLen |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |   Source/Subnet Address  ...  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Group Address  ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Reserved:  must be set to zero and ignore on receipt.

   Instance ID:  the low-order 24-bits that can go into a LISP data
      header when the I-bit is set.  See [RFC6830] for details.  The use
      of the Instance-ID in this LCAF type is to associate a multicast
      forwarding entry for a given VPN.  The instance-ID describes the
      VPN and is registered to the mapping database system as a 3-tuple
      of (Instance-ID, S-prefix, G-prefix).

   Source MaskLen:  the mask length of the source prefix that follows.




Farinacci, et al.        Expires March 23, 2017                [Page 14]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Group MaskLen:  the mask length of the group prefix that follows.

   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Source/Subnet Address  is the source address or prefix for encoding a
      (S,G) multicast entry.

   Group Address  is the group address or group prefix for encoding
      (S,G) or (*,G) multicast entries.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended
   EIDs are used in Map-Referral messages.



































Farinacci, et al.        Expires March 23, 2017                [Page 15]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.6.  Traffic Engineering using Re-encapsulating Tunnels

   For a given EID lookup into the mapping database, this LCAF format
   can be returned to provide a list of locators in an explicit re-
   encapsulation path.  See [I-D.farinacci-lisp-te] for details.

   Explicit Locator Path (ELP) Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 10   |     Rsvd2     |               n               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Rsvd3         |L|P|S|           AFI =3D x             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Reencap Hop 1  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Rsvd3         |L|P|S|           AFI =3D x             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                         Reencap Hop k  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd3:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   Lookup bit (L):  this is the Lookup bit used to indicate to the user
      of the ELP to not use this address for encapsulation but to look
      it up in the mapping database system to obtain an encapsulating
      RLOC address.

   RLOC-Probe bit (P):  this is the RLOC-probe bit which means the
      Reencap Hop allows RLOC-probe messages to be sent to it.  When the
      R-bit is set to 0, RLOC-probes must not be sent.  When a Reencap
      Hop is an anycast address then multiple physical Reencap Hops are
      using the same RLOC address.  In this case, RLOC-probes are not
      needed because when the closest RLOC address is not reachable
      another RLOC address can be reachable.

   Strict bit (S):  this is the strict bit which means the associated
      Rencap Hop is required to be used.  If this bit is 0, the
      reencapsulator can skip this Reencap Hop and go to the next one in
      the list.





Farinacci, et al.        Expires March 23, 2017                [Page 16]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.  This encoding
   does not need to be understood by the mapping system for mapping
   database lookups since this LCAF type is not a lookup key.





















4.7.  Storing Security Data in the Mapping Database

   When a locator in a locator-set has a security key associated with
   it, this LCAF format will be used to encode key material.  See
   [I-D.ietf-lisp-ddt] for details.

















Farinacci, et al.        Expires March 23, 2017                [Page 17]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Security Key Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 11   |      Rsvd2    |             6 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Key Count   |      Rsvd3    | Key Algorithm |   Rsvd4     |R|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           Key Length          |       Key Material ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        ... Key Material                       |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Locator Address ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that start with the Key
      Material field.

   Key Count:  the Key Count field declares the number of Key sections
      included in this LCAF.

   Rsvd3:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   Key Algorithm:  the Algorithm field identifies the key's
      cryptographic algorithm and specifies the format of the Public Key
      field.

   Rsvd4:  this field is reserved for future use and MUST be transmitted
      as 0 and ignored on receipt.

   R bit:  this is the revoke bit and, if set, it specifies that this
      Key is being Revoked.

   Key Length:  this field determines the length in bytes of the Key
      Material field.

   Key Material:  the Key Material field stores the key material.  The
      format of the key material stored depends on the Key Algorithm
      field.

   AFI =3D x:  x can be any AFI value from [AFI].This is the locator
      address that owns the encoded security key.





Farinacci, et al.        Expires March 23, 2017                [Page 18]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  When
   LISP-DDT [I-D.ietf-lisp-ddt] is used as the mapping system mechanism,
   extended EIDs are used in Map-Referral messages.





















4.8.  Source/Destination 2-Tuple Lookups

   When both a source and destination address of a flow needs
   consideration for different locator-sets, this 2-tuple key is used in
   EID fields in LISP control messages.  When the Source/Dest key is
   registered to the mapping database, it can be encoded as a source-
   prefix and destination-prefix.  When the Source/Dest is used as a key
   for a mapping database lookup the source and destination come from a
   data packet.

















Farinacci, et al.        Expires March 23, 2017                [Page 19]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Source/Dest Key Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 12   |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            Reserved           |   Source-ML   |    Dest-ML    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Source-Prefix ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |     Destination-Prefix ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Reserved:  must be set to zero and ignore on receipt.

   Source-ML:  the mask length of the source prefix that follows.

   Dest-ML:  the mask length of the destination prefix that follows.

   AFI =3D x:  x can be any AFI value from [AFI].  When a specific AFI =
has
      its own encoding of a multicast address, this field must be either
      a group address or a broadcast address.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended
   EIDs are used in Map-Referral messages.  Refer to
   [I-D.farinacci-lisp-te] for usage details of this LCAF type.


















Farinacci, et al.        Expires March 23, 2017                [Page 20]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.9.  Replication List Entries for Multicast Forwarding

   The Replication List Entry LCAF type is an encoding for a locator
   being used for unicast replication according to the specification in
   [I-D.coras-lisp-re].  This locator encoding is pointed to by a
   Multicast Info LCAF Type and is registered by Re-encapsulating Tunnel
   Routers (RTRs) that are participating in an overlay distribution
   tree.  Each RTR will register its locator address and its configured
   level in the distribution tree.

   Replication List Entry Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 13   |    Rsvd2      |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              Rsvd3            |     Rsvd4     |  Level Value  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |           RTR/ETR #1 ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              Rsvd3            |     Rsvd4     |  Level Value  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |           RTR/ETR  #n ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd{1,2,3,4}:  must be set to zero and ignore on receipt.

   Level Value:  this value is associated with the level within the
      overlay distribution tree hierarchy where the RTR resides.  The
      level numbers are ordered from lowest value being close to the ITR
      (meaning that ITRs replicate to level-0 RTRs) and higher levels
      are further downstream on the distribution tree closer to ETRs of
      multicast receiver sites.

   AFI =3D x:  x can be any AFI value from [AFI].  A specific AFI has =
its
      own encoding of either a unicast or multicast locator address.
      For efficiency reasons, all RTR/ETR entries for the same level
      should be combined together by a Map-Server to avoid searching
      through the entire multi-level list of locator entries in a Map-
      Reply message.

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.



Farinacci, et al.        Expires March 23, 2017                [Page 21]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.  Applications for AFI List Type

4.10.1.  Binding IPv4 and IPv6 Addresses

   When header translation between IPv4 and IPv6 is desirable a LISP
   Canonical Address can use the AFI List Type to carry a variable
   number of AFIs in one LCAF AFI.

   Address Binding LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |         2 + 4 + 2 + 16        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |            AFI =3D 2            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          IPv6 Address ...                     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address  ...                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                     ...  IPv6 Address                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 24 when IPv4 and IPv6 AFI
      encoded addresses are used.

   This type of address format can be included in a Map-Request when the
   address is being used as an EID, but the Mapping Database System
   lookup destination can use only the IPv4 address.  This is so a
   Mapping Database Service Transport System, such as LISP-ALT
   [RFC6836], can use the Map-Request destination address to route the
   control message to the desired LISP site.

   Usage: This encoding can be used in EID or RLOC records in Map-
   Requests, Map-Replies, Map-Registers, and Map-Notify messages.  See
   subsections in this section for specific use cases.








Farinacci, et al.        Expires March 23, 2017                [Page 22]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.2.  Layer-2 VPNs

   When MAC addresses are stored in the LISP Mapping Database System,
   the AFI List Type can be used to carry AFI 6.

   MAC Address LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             2 + 6             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             AFI =3D 6           |    Layer-2 MAC Address  ...   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                    ... Layer-2 MAC Address                    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 8 when MAC address AFI encoded
      addresses are used.

   This address format can be used to connect layer-2 domains together
   using LISP over an IPv4 or IPv6 core network to create a layer-2 VPN.
   In this use-case, a MAC address is being used as an EID, and the
   locator-set that this EID maps to can be an IPv4 or IPv6 RLOCs, or
   even another MAC address being used as an RLOC.  See
   [I-D.portoles-lisp-eid-mobility] for how layer-2 VPNs operate when
   doing EID mobility.






















Farinacci, et al.        Expires March 23, 2017                [Page 23]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.3.  ASCII Names in the Mapping Database

   If DNS names or URIs are stored in the LISP Mapping Database System,
   the AFI List Type can be used to carry an ASCII string where it is
   delimited by length 'n' of the LCAF Length encoding.

   ASCII LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             2 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             AFI =3D 17          |      DNS Name or URI  ...     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes AFI=3D17 field and the =
null-terminated
      ASCII string (the last byte of 0 is included).































Farinacci, et al.        Expires March 23, 2017                [Page 24]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.4.  Using Recursive LISP Canonical Address Encodings

   When any combination of above is desirable, the AFI List Type value
   can be used to carry within the LCAF AFI another LCAF AFI (for
   example, Application Specific Data see Section 5.1.

   Recursive LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |             8 + 18            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 4    |     Rsvd2     |            12 + 6             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   IP TOS, IPv6 QQS or Flow Label              |    Protocol   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Local Port (lower-range)   |    Local Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Remote Port (lower-range)   |   Remote Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            AFI =3D 1            |       IPv4 Address ...        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     ...  IPv4 Address         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length:  length in bytes is fixed at 18 when an AFI=3D1 IPv4 address =
is
      included.

   This format could be used by a Mapping Database Transport System,
   such as LISP-ALT [RFC6836], where the AFI=3D1 IPv4 address is used as
   an EID and placed in the Map-Request destination address by the
   sending LISP system.  The ALT system can deliver the Map-Request to
   the LISP destination site independent of the Application Data Type
   AFI payload values.  When this AFI is processed by the destination
   LISP site, it can return different locator-sets based on the type of
   application or level of service that is being requested.










Farinacci, et al.        Expires March 23, 2017                [Page 25]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


4.10.5.  Compatibility Mode Use Case

   A LISP system should use the AFI List Type format when sending to
   LISP systems that do not support a particular LCAF Type used to
   encode locators.  This allows the receiving system to be able to
   parse a locator address for encapsulation purposes.  The list of AFIs
   in an AFI List LCAF Type has no semantic ordering and a receiver
   should parse each AFI element no matter what the ordering.

   Compatibility Mode Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 1    |     Rsvd2     |          8 + 14 + 6           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 5    |     Rsvd2     |            12 + 2             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |N|     Latitude Degrees        |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |E|     Longitude Degrees       |    Minutes    |    Seconds    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                            Altitude                           |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D 0          |           AFI =3D 1             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          IPv4 Address                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   If a system does not recognized the Geo Coordinate LCAF Type that is
   accompanying a locator address, an encoder can include the Geo
   Coordinate LCAF Type embedded in a AFI List LCAF Type where the AFI
   in the Geo Coordinate LCAF is set to 0 and the AFI encoded next in
   the list is encoded with a valid AFI value to identify the locator
   address.

   A LISP system is required to support the AFI List LCAF Type to use
   this procedure.  It would skip over 10 bytes of the Geo Coordinate
   LCAF Type to get to the locator address encoding (an IPv4 locator
   address).  A LISP system that does support the Geo Coordinate LCAF
   Type can support parsing the locator address within the Geo
   Coordinate LCAF encoding or in the locator encoding that follows in
   the AFI List LCAF.




Farinacci, et al.        Expires March 23, 2017                [Page 26]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.  Experimental LISP Canonical Address Applications

5.1.  Convey Application Specific Data

   When a locator-set needs to be conveyed based on the type of
   application or the Per-Hop Behavior (PHB) of a packet, the
   Application Data Type can be used.

   Application Data LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 4    |     Rsvd2     |            12 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |       IP TOS, IPv6 TC, or Flow Label          |    Protocol   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Local Port (lower-range)   |    Local Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Remote Port (lower-range)   |   Remote Port (upper-range)   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      8-byte Application Data fields including the AFI field itself.

   IP TOS, IPv6 TC, or Flow Label:  this field stores the 8-bit IPv4 TOS
      field used in an IPv4 header, the 8-bit IPv6 Traffic Class or Flow
      Label used in an IPv6 header.

   Local Port/Remote Port Ranges:  these fields are from the TCP, UDP,
      or SCTP transport header.  A range can be specified by using a
      lower value and an upper value.  When a single port is encoded,
      the lower and upper value fields are the same.

   AFI =3D x:  x can be any AFI value from [AFI].

   The Application Data Canonical Address Type is used for an EID
   encoding when an ITR wants a locator-set for a specific application.
   When used for an RLOC encoding, the ETR is supplying a locator-set
   for each specific application is has been configured to advertise.

   Usage: This encoding can be used in EID records in Map-Requests, Map-
   Replies, Map-Registers, and Map-Notify messages.  When LISP-DDT
   [I-D.ietf-lisp-ddt] is used as the mapping system mechanism, extended



Farinacci, et al.        Expires March 23, 2017                [Page 27]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   EIDs are used in Map-Referral messages.  This LCAF type is used as a
   lookup key to the mapping system that can return a longest-match or
   exact-match entry.





















5.2.  Generic Database Mapping Lookups

   When the LISP Mapping Database system holds information accessed by a
   generic formatted key (where the key is not the usual IPv4 or IPv6
   address), an opaque key may be desirable.

   Opaque Key LISP Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 6    |     Rsvd2     |             3 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | Key Field Num |      Key Wildcard Fields      |   Key . . .   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       . . . Key                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the type's payload.  The value n
      is the number of bytes that follow this Length field.





Farinacci, et al.        Expires March 23, 2017                [Page 28]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Key Field Num:  the value of this field is the the number of "Key"
      sub-fields minus 1, the "Key" field can be broken up into.  So if
      this field has a value of 0, there is 1 sub-field in the "Key".
      The width of the sub-fields are fixed length.  So for a key size
      of 8 bytes, with a Key Field Num of 3, allows 4 sub-fields of 2
      bytes each in length.  Allowing for a reasonable number of 16 sub-
      field separators, valid values range from 0 to 15.

   Key Wildcard Fields:  describes which fields in the key are not used
      as part of the key lookup.  This wildcard encoding is a bitfield.
      Each bit is a don't-care bit for a corresponding field in the key.
      Bit 0 (the low-order bit) in this bitfield corresponds the first
      field, the low-order field in the key, bit 1 the second field, and
      so on.  When a bit is set in the bitfield it is a don't-care bit
      and should not be considered as part of the database lookup.  When
      the entire 16-bits is set to 0, then all bits of the key are used
      for the database lookup.

   Key:  the variable length key used to do a LISP Database Mapping
      lookup.  The length of the key is the value n (as shown above).

   Usage: This is an experimental type where the usage has not been
   defined yet.




























Farinacci, et al.        Expires March 23, 2017                [Page 29]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.3.  PETR Admission Control Functionality

   When a public PETR device wants to verify who is encapsulating to it,
   it can check for a specific nonce value in the LISP encapsulated
   packet.  To convey the nonce to admitted ITRs or PITRs, this LCAF
   format is used in a Map-Register or Map-Reply locator-record.

   Nonce Locator Canonical Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 8    |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Reserved    |                  Nonce                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |         Address  ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the AFI address that follows the
      Nonce field including the AFI field itself.

   Reserved:  must be set to zero and ignore on receipt.

   Nonce:  this is a nonce value returned by an ETR in a Map-Reply
      locator-record to be used by an ITR or PITR when encapsulating to
      the locator address encoded in the AFI field of this LCAF type.
      This nonce value is inserted in the nonce field in the LISP header
      encapsulation.

   AFI =3D x:  x can be any AFI value from [AFI].

   Usage: This is an experimental type where the usage has not been
   defined yet.















Farinacci, et al.        Expires March 23, 2017                [Page 30]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.4.  Data Model Encoding

   This type allows a JSON data model to be encoded either as an EID or
   RLOC.

   JSON Data Model Type Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 14   |    Rsvd2    |B|             2 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           JSON length         | JSON binary/text encoding ... |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Optional Address ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of the fields that follow the "JSON
      length" field.

   Rsvd{1,2}:  must be set to zero and ignore on receipt.

   B bit:  indicates that the JSON field is binary encoded according to
      [JSON-BINARY] when the bit is set to 1.  Otherwise the encoding is
      based on text encoding according to [RFC7159].

   JSON length:  length in octets of the following 'JSON binary/text
      encoding' field.

   JSON binary/text encoding field:  a variable length field that
      contains either binary or text encodings.

   AFI =3D x:  x can be any AFI value from [AFI].  A specific AFI has =
its
      own encoding of either a unicast or multicast locator address.
      All RTR/ETR entries for the same level should be combined together
      by a Map-Server to avoid searching through the entire multi-level
      list of locator entries in a Map-Reply message.

   Usage: This is an experimental type where the usage has not been
   defined yet.









Farinacci, et al.        Expires March 23, 2017                [Page 31]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


5.5.  Encoding Key/Value Address Pairs

   The Key/Value pair is for example useful for attaching attributes to
   other elements of LISP packets, such as EIDs or RLOCs.  When
   attaching attributes to EIDs or RLOCs, it's necessary to distinguish
   between the element that should be used as EID or RLOC, and hence as
   key for lookups, and additional attributes.  This is especially the
   case when the difference cannot be determined from the types of the
   elements, such as when two IP addresses are being used.

   Key/Value Pair Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 15   |     Rsvd2     |               n               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |       Address as Key ...      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D y          |       Address as Value ...    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Length value n:  length in bytes of fields that follow.

   Rsvd{1,2}:  must be set to zero and ignore on receipt.

   AFI =3D x:  x is the "Address as Key" AFI that can have any value =
from
      [AFI].  A specific AFI has its own encoding of either a unicast or
      multicast locator address.  All RTR/ETR entries for the same level
      should be combined together by a Map-Server to avoid searching
      through the entire multi-level list of locator entries in a Map-
      Reply message.

   Address as Key:  this AFI encoded address will be attached with the
      attributes encoded in "Address as Value" which follows this field.

   AFI =3D y:  y is the "Address of Value" AFI that can have any value
      from [AFI].  A specific AFI has its own encoding of either a
      unicast or multicast locator address.  All RTR/ETR entries for the
      same level should be combined together by a Map-Server to avoid
      searching through the entire multi-level list of locator entries
      in a Map-Reply message.

   Address as Value:  this AFI encoded address will be the attribute
      address that goes along with "Address as Key" which precedes this
      field.



Farinacci, et al.        Expires March 23, 2017                [Page 32]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Usage: This is an experimental type where the usage has not been
   defined yet.































5.6.  Multiple Data-Planes

   Overlays are becoming popular in many parts of the network which have
   created an explosion of data-plane encapsulation headers.  Since the
   LISP mapping system can hold many types of address formats, it can
   represent the encapsulation format supported by an RLOC as well.
   When an encapsulator receives a Map-Reply with an Encapsulation
   Format LCAF Type encoded in an RLOC-record, it can select an
   encapsulation format, that it can support, from any of the
   encapsulation protocols which have the bit set to 1 in this LCAF
   type.







Farinacci, et al.        Expires March 23, 2017                [Page 33]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   Encapsulation Format Address Format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           AFI =3D 16387         |     Rsvd1     |     Flags     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Type =3D 16   |     Rsvd2     |             4 + n             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |        Reserved-for-Future-Encapsulations       |U|G|N|v|V|l|L|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              AFI =3D x          |          Address ...          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Rsvd1/Rsvd2:  must be set to zero and ignored on receipt.

   Length value n:  length in bytes of the AFI address that follows the
      next 32-bits including the AFI field itself.

   Reserved-for-Future-Encapsulations:  must be set to zero and ignored
      on receipt.  This field will get bits allocated to future
      encapsulations, as they are created.

   L: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept layer3 LISP encapsulation using destination UDP port
      4341 [RFC6830].

   l: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept layer2 LISP encapsulation using destination UDP port
      8472 [I-D.smith-lisp-layer2].

   V: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept VXLAN encapsulation using destination UDP port 4789
      [RFC7348].

   v: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept VXLAN-GPE encapsulation using destination UDP port 4790
      [I-D.quinn-vxlan-gpe].

   N: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept NV-GRE encapsulation using IPv4/ IPv6 protocol number
      47 [RFC7637].

   G: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept GENEVE encapsulation using destination UDP port 6081
      [I-D.gross-geneve].





Farinacci, et al.        Expires March 23, 2017                [Page 34]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   U: The RLOCs listed in the AFI encoded addresses in the next longword
      can accept GUE encapsulation using destination UDP port TBD
      [I-D.herbert-gue].

   Usage: This encoding can be used in RLOC records in Map-Requests,
   Map-Replies, Map-Registers, and Map-Notify messages.













































Farinacci, et al.        Expires March 23, 2017                [Page 35]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


6.  Security Considerations

   There are no security considerations for this specification.  The
   security considerations are documented for the protocols that use
   LISP Canonical Addressing.

   The use of the Geo-Coordinates LCAF Type may raise physical privacy
   issues.  Care should be taken when configuring the mapping system to
   use specific policy parameters so geo-location information is not
   returned gratutiosly.

7.  IANA Considerations

   This document defines a canonical address format encoding used in
   LISP control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.  Such address format is based on a fixed AFI
   (16387) and a LISP LCAF Type field.

   The LISP LCAF Type field is an 8-bit field specific to the LISP
   Canonical Address formatted encodings, for which IANA is to create
   and maintain a new registry (as outlined in [RFC5226]) entitled "LISP
   LCAF Type".  Initial values for the LISP LCAF Type registry are given
   below.  Future assignments are to be made through expert review with
   a specification required publication.  Assignments consist of a LISP
   LCAF Type name and its associated value:

           +-------+------------------------------+------------+
           | Value | LISP LCAF Type Name          | Definition |
           +-------+------------------------------+------------+
           | 0     | Null Body Type               | Section 3  |
           | 1     | AFI List Type                | Section 3  |
           | 2     | Instance ID Type             | Section 3  |
           | 3     | AS Number Type               | Section 3  |
           | 5     | Geo Coordinates Type         | Section 3  |
           | 7     | NAT-Traversal Type           | Section 3  |
           | 9     | Multicast Info Type          | Section 3  |
           | 10    | Explicit Locator Path Type   | Section 3  |
           | 11    | Security Key Type            | Section 3  |
           | 12    | Source/Dest Key Type         | Section 3  |
           | 13    | Replication List Entry Type  | Section 3  |
           +-------+------------------------------+------------+

                  Table 1: LISP LCAF Type Initial Values








Farinacci, et al.        Expires March 23, 2017                [Page 36]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


8.  References

8.1.  Normative References

   [RFC1918]  Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.,
              and E. Lear, "Address Allocation for Private Internets",
              BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996,
              <http://www.rfc-editor.org/info/rfc1918>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC3232]  Reynolds, J., Ed., "Assigned Numbers: RFC 1700 is Replaced
              by an On-line Database", RFC 3232, DOI 10.17487/RFC3232,
              January 2002, <http://www.rfc-editor.org/info/rfc3232>.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              DOI 10.17487/RFC5226, May 2008,
              <http://www.rfc-editor.org/info/rfc5226>.

   [RFC6830]  Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The
              Locator/ID Separation Protocol (LISP)", RFC 6830,
              DOI 10.17487/RFC6830, January 2013,
              <http://www.rfc-editor.org/info/rfc6830>.

   [RFC6836]  Fuller, V., Farinacci, D., Meyer, D., and D. Lewis,
              "Locator/ID Separation Protocol Alternative Logical
              Topology (LISP+ALT)", RFC 6836, DOI 10.17487/RFC6836,
              January 2013, <http://www.rfc-editor.org/info/rfc6836>.

   [RFC7159]  Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
              Interchange Format", RFC 7159, DOI 10.17487/RFC7159, March
              2014, <http://www.rfc-editor.org/info/rfc7159>.

   [RFC7348]  Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
              L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
              eXtensible Local Area Network (VXLAN): A Framework for
              Overlaying Virtualized Layer 2 Networks over Layer 3
              Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
              <http://www.rfc-editor.org/info/rfc7348>.

   [RFC7637]  Garg, P., Ed. and Y. Wang, Ed., "NVGRE: Network
              Virtualization Using Generic Routing Encapsulation",
              RFC 7637, DOI 10.17487/RFC7637, September 2015,
              <http://www.rfc-editor.org/info/rfc7637>.



Farinacci, et al.        Expires March 23, 2017                [Page 37]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


8.2.  Informative References

   [AFI]      IANA, , "Address Family Identifier (AFIs)", ADDRESS FAMILY
              NUMBERS http://www.iana.org/numbers.html, Febuary 2007.

   [I-D.coras-lisp-re]
              Coras, F., Cabellos-Aparicio, A., Domingo-Pascual, J.,
              Maino, F., and D. Farinacci, "LISP Replication
              Engineering", draft-coras-lisp-re-08 (work in progress),
              November 2015.

   [I-D.ermagan-lisp-nat-traversal]
              Ermagan, V., Farinacci, D., Lewis, D., Skriver, J., Maino,
              F., and C. White, "NAT traversal for LISP", draft-ermagan-
              lisp-nat-traversal-11 (work in progress), August 2016.

   [I-D.farinacci-lisp-te]
              Farinacci, D., Kowal, M., and P. Lahiri, "LISP Traffic
              Engineering Use-Cases", draft-farinacci-lisp-te-11 (work
              in progress), September 2016.

   [I-D.gross-geneve]
              Gross, J., Sridhar, T., Garg, P., Wright, C., Ganga, I.,
              Agarwal, P., Duda, K., Dutt, D., and J. Hudson, "Geneve:
              Generic Network Virtualization Encapsulation", draft-
              gross-geneve-02 (work in progress), October 2014.

   [I-D.herbert-gue]
              Herbert, T., Yong, L., and O. Zia, "Generic UDP
              Encapsulation", draft-herbert-gue-03 (work in progress),
              March 2015.

   [I-D.ietf-lisp-ddt]
              Fuller, V., Lewis, D., Ermagan, V., Jain, A., and A.
              Smirnov, "LISP Delegated Database Tree", draft-ietf-lisp-
              ddt-08 (work in progress), September 2016.

   [I-D.portoles-lisp-eid-mobility]
              Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino,
              F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a
              Unified Control Plane", draft-portoles-lisp-eid-
              mobility-00 (work in progress), April 2016.









Farinacci, et al.        Expires March 23, 2017                [Page 38]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


   [I-D.quinn-vxlan-gpe]
              Quinn, P., Manur, R., Kreeger, L., Lewis, D., Maino, F.,
              Smith, M., Agarwal, P., Yong, L., Xu, X., Elzur, U., Garg,
              P., and D. Melman, "Generic Protocol Extension for VXLAN",
              draft-quinn-vxlan-gpe-04 (work in progress), February
              2015.

   [I-D.smith-lisp-layer2]
              Smith, M., Dutt, D., Farinacci, D., and F. Maino, "Layer 2
              (L2) LISP Encapsulation Format", draft-smith-lisp-
              layer2-03 (work in progress), September 2013.

   [JSON-BINARY]
              "Universal Binary JSON Specification",
              URL http://ubjson.org.

   [WGS-84]   Geodesy and Geophysics Department, DoD., "World Geodetic
              System 1984", NIMA TR8350.2, January 2000, <http://earth-
              info.nga.mil/GandG/publications/tr8350.2/wgs84fin.pdf>.

Appendix A.  Acknowledgments

   The authors would like to thank Vince Fuller, Gregg Schudel, Jesper
   Skriver, Luigi Iannone, Isidor Kouvelas, and Sander Steffann for
   their technical and editorial commentary.

   The authors would like to thank Victor Moreno for discussions that
   lead to the definition of the Multicast Info LCAF type.

   The authors would like to thank Parantap Lahiri and Michael Kowal for
   discussions that lead to the definition of the Explicit Locator Path
   (ELP) LCAF type.

   The authors would like to thank Fabio Maino and Vina Ermagan for
   discussions that lead to the definition of the Security Key LCAF
   type.

   The authors would like to thank Albert Cabellos-Aparicio and Florin
   Coras for discussions that lead to the definition of the Replication
   List Entry LCAF type.

   Thanks goes to Michiel Blokzijl and Alberto Rodriguez-Natal for
   suggesting new LCAF types.

   Thanks also goes to Terry Manderson for assistance obtaining a LISP
   AFI value from IANA.





Farinacci, et al.        Expires March 23, 2017                [Page 39]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


Appendix B.  Document Change Log

   [RFC Editor: Please delete this section on publication as RFC.]

B.1.  Changes to draft-ietf-lisp-lcaf-15.txt

   o  Submitted September 2016.

   o  Addressed comments from Routing Directorate reviewer Stig Venass.

B.2.  Changes to draft-ietf-lisp-lcaf-14.txt

   o  Submitted July 2016.

   o  Fix IDnits errors and comments from Luigi Iannone, document
      shepherd.

B.3.  Changes to draft-ietf-lisp-lcaf-13.txt

   o  Submitted May 2016.

   o  Explain the Instance-ID LCAF Type is 32-bits in length and the
      Instance-ID field in the LISP encapsulation header is 24-bits.

B.4.  Changes to draft-ietf-lisp-lcaf-12.txt

   o  Submitted March 2016.

   o  Updated references and document timer.

   o  Removed the R, J, and L bits from the Multicast Info Type LCAF
      since working group decided to not go forward with draft-
      farinacci-lisp-mr-signaling-03.txt in favor of draft- ietf-lisp-
      signal-free-00.txt.

B.5.  Changes to draft-ietf-lisp-lcaf-11.txt

   o  Submitted September 2015.

   o  Reflecting comments from Prague LISP working group.

   o  Readying document for a LISP LCAF registry, RFC publication, and
      for new use-cases that will be defined in the new charter.








Farinacci, et al.        Expires March 23, 2017                [Page 40]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


B.6.  Changes to draft-ietf-lisp-lcaf-10.txt

   o  Submitted June 2015.

   o  Fix coauthor Job's contact information.

B.7.  Changes to draft-ietf-lisp-lcaf-09.txt

   o  Submitted June 2015.

   o  Fix IANA Considerations section to request a registry to allocate
      and track LCAF Type values.

B.8.  Changes to draft-ietf-lisp-lcaf-08.txt

   o  Submitted April 2015.

   o  Comment from Florin.  The Application Data Type length field has a
      typo.  The field should be labeled "12 + n" and not "8 + n".

   o  Fix length fields in the sections titled "Using Recursive LISP
      Canonical Address Encodings", "Generic Database Mapping Lookups",
      and "Data Model Encoding".

B.9.  Changes to draft-ietf-lisp-lcaf-07.txt

   o  Submitted December 2014.

   o  Add a new LCAF Type called "Encapsulation Format" so decapsulating
      xTRs can inform encapsulating xTRs what data-plane encapsulations
      they support.

B.10.  Changes to draft-ietf-lisp-lcaf-06.txt

   o  Submitted October 2014.

   o  Make it clear how sorted RLOC records are done when LCAFs are used
      as the RLOC record.

B.11.  Changes to draft-ietf-lisp-lcaf-05.txt

   o  Submitted May 2014.

   o  Add a length field of the JSON payload that can be used for either
      binary or text encoding of JSON data.






Farinacci, et al.        Expires March 23, 2017                [Page 41]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


B.12.  Changes to draft-ietf-lisp-lcaf-04.txt

   o  Submitted January 2014.

   o  Agreement among ELP implementors to have the AFI 16-bit field
      adjacent to the address.  This will make the encoding consistent
      with all other LCAF type address encodings.

B.13.  Changes to draft-ietf-lisp-lcaf-03.txt

   o  Submitted September 2013.

   o  Updated references and author's affilations.

   o  Added Instance-ID to the Multicast Info Type so there is relative
      ease in parsing (S,G) entries within a VPN.

   o  Add port range encodings to the Application Data LCAF Type.

   o  Add a new JSON LCAF Type.

   o  Add Address Key/Value LCAF Type to allow attributes to be attached
      to an address.

B.14.  Changes to draft-ietf-lisp-lcaf-02.txt

   o  Submitted March 2013.

   o  Added new LCAF Type "Replication List Entry" to support LISP
      replication engineering use-cases.

   o  Changed references to new LISP RFCs.

B.15.  Changes to draft-ietf-lisp-lcaf-01.txt

   o  Submitted January 2013.

   o  Change longitude range from 0-90 to 0-180 in section 4.4.

   o  Added reference to WGS-84 in section 4.4.

B.16.  Changes to draft-ietf-lisp-lcaf-00.txt

   o  Posted first working group draft August 2012.

   o  This draft was renamed from draft-farinacci-lisp-lcaf-10.txt.





Farinacci, et al.        Expires March 23, 2017                [Page 42]
=0C
Internet-Draft    LISP Canonical Address Format (LCAF)    September 2016


Authors' Addresses

   Dino Farinacci
   lispers.net
   San Jose, CA
   USA

   Email: farinacci@gmail.com


   Dave Meyer
   Brocade
   San Jose, CA
   USA

   Email: dmm@1-4-5.net


   Job Snijders
   NTT Communications
   Theodorus Majofskistraat 100
   Amsterdam  1065 SZ
   NL

   Email: job@ntt.net


























Farinacci, et al.        Expires March 23, 2017                [Page 43]

--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii




--Apple-Mail=_3612B9A9-65E7-45CD-BFD8-EE24EBFDD2E4--


From nobody Mon Sep 19 09:08:52 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD45A12B44C; Mon, 19 Sep 2016 09:08:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZJUk7IZjt04j; Mon, 19 Sep 2016 09:08:47 -0700 (PDT)
Received: from mail-pf0-x22e.google.com (mail-pf0-x22e.google.com [IPv6:2607:f8b0:400e:c00::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37CF412B451; Mon, 19 Sep 2016 09:06:49 -0700 (PDT)
Received: by mail-pf0-x22e.google.com with SMTP id q2so32197376pfj.3; Mon, 19 Sep 2016 09:06:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=kXmiPJtIpz6vDwqjI7tt8EwgOSEqkund6HJuRugdc1U=; b=wI6GmNe4bwwlFjd3vrK4tIaysUkdCaMg6sLdPVpbkCds8Bc27IdJi2iaei66CJIH2M j5YIthxfQeO+jfyEje20CKzb1dSX62dYCYCYWto9h7J1E5i52kwAx6FeyquVpyTgNTD7 3kYIz5AZxS/sEmRBO+u5TM9WVJE5qSEImj5FqOa6GDT/xCmb9HNYamGT7H9Z3Et04jH4 NEeXueNayj7KqaJuzm/Ib7IgnizYQ9OkI/M1tbtd1GE6fHEf7ELAbuqUxU05xTzKqbkI F6a9End8oTSnIjNlEwLRhCAZcPAVcbbKUMAEBfbEe097hchDm2DCUXnDLMP27dhx0kYV Q2Jw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=kXmiPJtIpz6vDwqjI7tt8EwgOSEqkund6HJuRugdc1U=; b=GdJ8RBeVlcDsItOVGU0aCEPYLPv8ZsPm2KssfQ4rd20Jlp9B/JzWlszoz51KyQAiLp RvdO8RztSC1vyXTHxBo9xGubJsteljsOKPdXtaHA2Xfrg8m0xSywR27OpcD/dPaZJRnn y1du8zGNhvKPxBONwXspJeZOMFhClLFHb2Dd3iPRBQIZT4nG2WxgW8vaZANvcVaOYJdi 5Cjg2lVCLUS7TtTCtIJRhSvuqXYyfkSt7pNZY2m3AL+13nMkCX0J5sC9pAH/djaKcmjm z//KONeolEQW7dfzDnE1z615+tFkDqibWQXLMGW8ODxuLFKWzjyHn1KuwzpjSjJ4njtB K1/A==
X-Gm-Message-State: AE9vXwNbKnB9a7RQtfT+mz6XSs+2VxJy0fyXnz2iFbC8aKnq1vIefJlA/jykQaCmM6OziQ==
X-Received: by 10.98.222.3 with SMTP id h3mr47420504pfg.146.1474301206645; Mon, 19 Sep 2016 09:06:46 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id e71sm46885224pfc.75.2016.09.19.09.06.41 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 19 Sep 2016 09:06:44 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <B5D701A0-6D12-436B-8091-3802662556C1@gmail.com>
Date: Mon, 19 Sep 2016 09:06:40 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <AE095A9B-F7C7-46BE-89D7-C1224B314EE2@gmail.com>
References: <9a0ab6afeff3fc8b86cc320a757ccbf8@tcb.net> <C11A93C3-6334-42B4-B5A7-065E8725C5E7@gigix.net> <B5D701A0-6D12-436B-8091-3802662556C1@gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ZYH2pW60G2e27YV_7DCWGFCXY0I>
Cc: zhang.xian@huawei.com, LISP mailing list list <lisp@ietf.org>, Jonathan.Hardwick@metaswitch.com, draft-ietf-lisp-crypto.authors@ietf.org, Jon Hudson <jon.hudson@gmail.com>
Subject: Re: [lisp] RTG-DIR REVIEW: draft-ietf-lisp-crypto-06.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 16:08:50 -0000

Any status on this?

Dino

> On Sep 5, 2016, at 10:07 AM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>=20
> See responses inline. A new draft is attached (but not submitted since =
I had some open questions).
>=20
>>> Document: draft-ietf-lisp-crypto-06.txt
>>>=20
>>> Reviewer: Danny McPherson
>>>=20
>>> Review Date: August 24, 2016
>>>=20
>>> Intended Status: Experimental
>=20
> Thanks for the review Danny.
>=20
>>> Summary:
>>>=20
>>> I have some minor concerns about this document that should be =
considered before publication.
>>>=20
>>> Comments:
>>>=20
>>> I believe the draft is technically sound.=20
>>>=20
>>> Major Issues:
>>>=20
>>> I have no =E2=80=9CMajor=E2=80=9D issues with this I-D.
>=20
> Good to hear.
>=20
>>> Minor Issues:
>>>=20
>>> In the Security Considerations section a small amount of text might =
be useful that discusses end-end v. encryption from middle boxes, and =
the risks therein.  There are clearly benefits to this over no =
encryption, but there are risks about assumptions that may be made =
thereafter as well.
>=20
> I added some text. Please review.
>=20
>>> Nits:
>>>=20
>>> S.1: s/typically not modified.  Which means/typically not modified, =
which means/
>=20
> Changed.
>=20
>>> S.1: Is there in fact a case where asymmetries result in the *same* =
egress xTRs but different keys are used?  I believe this would just =
apply to "different xTRs", no?  :
>=20
> Right, when the same ETR is used by different ITRs to encapsulate =
traffic, different keys are used.
>=20
>>>        However, return traffic uses the same procedures but with =
different key values by the same xTRs or potentially different xTRs when =
the paths between LISP sites are asymmetric.
>=20
> Right, a unique set of keys are used for each {ITR, ETR} combination. =
Did you want me to say something specific here?
>=20
>>> S.1: Regarding "[t]his document has the following requirements for =
the solutions space", it might be useful to reference some general IETF =
privacy work, even RFC 6973 or the like.  Given that it's Experimental I =
think it's fine as is, but some references for the broader community may =
be in order.  In particular, references to not requiring a separate PKI =
(and therefore external or circular dependencies!), avoiding third party =
trust anchor, rekeying as good operational practice, not just =
compromises,  and other such arguments might be reinforced.=20
>=20
> I added a reference to 6973.
>=20
>>> S.3: Could include LCAF here, perhaps.
>=20
> Added plus its reference.
>=20
>>> S.4: You could probably strike this entire sentence and lessen =
confusion: "When an ETR (when it is also an ITR) encapsulates packets to =
this ITR (when it is also an ETR), a separate key exchange and =
shared-secret computation is performed.=E2=80=9D
>=20
> Okay, removed.
>=20
>>> S.7: It=E2=80=99s unclear what constitutes =E2=80=9CDiffie-Hellman =
*group*=E2=80=9D.
>=20
> I will change =E2=80=9Cgroup=E2=80=9D to =E2=80=9Cparameters=E2=80=9D.
>=20
>>>=20
>>> S.7: s/the the/the/
>>>=20
>>> S.7: s/integrity-check/integrity check/
>=20
> Changed both.
>=20
>>> S.8: Editors note to strike text in last paragraph here, unclear =
what resolution was from this text. =20
>=20
> We allocated two new bits from a 3-bit reserved field now leaving 1 =
reserve bit. I added that the reserved bit remaining is documented in =
RFC6830.
>=20
>>> S.12.1: A reference to the SAAG comments might be useful here?
>=20
> We don=E2=80=99t have one. But I will add a list of recommendations =
they provided.
>=20
>>> S 13: Are you sure you want a default FCFS allocation policy here =
and not a slightly higher bar?
>=20
> I have no opinion. What is the benefit on not doing FCFS?
>=20
>>> Throughout: Consistent hyphenation in the document would help (e.g., =
=E2=80=9Cnetwork-byte=E2=80=9D ..). =20
>=20
> Done.
>=20
>>> Throughout: Expanding on first use of each acronym would be useful, =
perhaps with references.
>=20
> Done.
>=20
> A new revision is attached (plus a htmlized diff file). Let me know if =
you like the text and then I=E2=80=99ll submit -07.
>=20
> Thanks again,
> Dino & Brian
>=20
> <rfcdiff.html><draft-ietf-lisp-crypto-07.txt>
>=20
>=20
>=20
>=20


From nobody Mon Sep 19 10:25:52 2016
Return-Path: <danny@tcb.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D69712B44F; Mon, 19 Sep 2016 10:25:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.217
X-Spam-Level: 
X-Spam-Status: No, score=-104.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a9A4h7rKb_oN; Mon, 19 Sep 2016 10:25:50 -0700 (PDT)
Received: from mail.tcb.net (mail.tcb.net [64.78.239.75]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F264612B11A; Mon, 19 Sep 2016 10:25:49 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.tcb.net (Postfix) with ESMTP id 8F609C7; Mon, 19 Sep 2016 11:25:49 -0600 (MDT)
X-Virus-Scanned: Debian amavisd-new at mailnew.seatmates.net
Received: from mail.tcb.net ([127.0.0.1]) by localhost (mail.chasingbugles.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9NRiiIW5ulMm; Mon, 19 Sep 2016 11:25:49 -0600 (MDT)
Received: from mail.tcb.net (localhost [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.tcb.net (Postfix) with ESMTPSA id 11A6DC5; Mon, 19 Sep 2016 11:25:49 -0600 (MDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Date: Mon, 19 Sep 2016 13:25:49 -0400
From: Danny McPherson <danny@tcb.net>
To: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <AE095A9B-F7C7-46BE-89D7-C1224B314EE2@gmail.com>
References: <9a0ab6afeff3fc8b86cc320a757ccbf8@tcb.net> <C11A93C3-6334-42B4-B5A7-065E8725C5E7@gigix.net> <B5D701A0-6D12-436B-8091-3802662556C1@gmail.com> <AE095A9B-F7C7-46BE-89D7-C1224B314EE2@gmail.com>
Message-ID: <d766e8102805db6fedefa3c5dbe1696a@tcb.net>
X-Sender: danny@tcb.net
User-Agent: Roundcube Webmail/0.9.5
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/duo_Q86COQC30-0J6-ZjMB-Bgkk>
Cc: zhang.xian@huawei.com, LISP mailing list list <lisp@ietf.org>, Jonathan.Hardwick@metaswitch.com, draft-ietf-lisp-crypto.authors@ietf.org, Jon Hudson <jon.hudson@gmail.com>
Subject: Re: [lisp] RTG-DIR REVIEW: draft-ietf-lisp-crypto-06.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 17:25:51 -0000

Nothing more from me (although I don't think that's where you query was 
directed), all the changes look good.

On the IANA question, was simply a matter of if you want to require 
something more rigid v. the most lax codepoint allocation model, but I 
don't have any strong opinion there.


-danny

On 2016-09-19 12:06 PM, Dino Farinacci wrote:
> Any status on this?
> 
> Dino
> 
>> On Sep 5, 2016, at 10:07 AM, Dino Farinacci <farinacci@gmail.com> 
>> wrote:
>> 
>> See responses inline. A new draft is attached (but not submitted since 
>> I had some open questions).
>> 
>>>> Document: draft-ietf-lisp-crypto-06.txt
>>>> 
>>>> Reviewer: Danny McPherson
>>>> 
>>>> Review Date: August 24, 2016
>>>> 
>>>> Intended Status: Experimental
>> 
>> Thanks for the review Danny.
>> 
>>>> Summary:
>>>> 
>>>> I have some minor concerns about this document that should be 
>>>> considered before publication.
>>>> 
>>>> Comments:
>>>> 
>>>> I believe the draft is technically sound.
>>>> 
>>>> Major Issues:
>>>> 
>>>> I have no “Major” issues with this I-D.
>> 
>> Good to hear.
>> 
>>>> Minor Issues:
>>>> 
>>>> In the Security Considerations section a small amount of text might 
>>>> be useful that discusses end-end v. encryption from middle boxes, 
>>>> and the risks therein.  There are clearly benefits to this over no 
>>>> encryption, but there are risks about assumptions that may be made 
>>>> thereafter as well.
>> 
>> I added some text. Please review.
>> 
>>>> Nits:
>>>> 
>>>> S.1: s/typically not modified.  Which means/typically not modified, 
>>>> which means/
>> 
>> Changed.
>> 
>>>> S.1: Is there in fact a case where asymmetries result in the *same* 
>>>> egress xTRs but different keys are used?  I believe this would just 
>>>> apply to "different xTRs", no?  :
>> 
>> Right, when the same ETR is used by different ITRs to encapsulate 
>> traffic, different keys are used.
>> 
>>>>        However, return traffic uses the same procedures but with 
>>>> different key values by the same xTRs or potentially different xTRs 
>>>> when the paths between LISP sites are asymmetric.
>> 
>> Right, a unique set of keys are used for each {ITR, ETR} combination. 
>> Did you want me to say something specific here?
>> 
>>>> S.1: Regarding "[t]his document has the following requirements for 
>>>> the solutions space", it might be useful to reference some general 
>>>> IETF privacy work, even RFC 6973 or the like.  Given that it's 
>>>> Experimental I think it's fine as is, but some references for the 
>>>> broader community may be in order.  In particular, references to not 
>>>> requiring a separate PKI (and therefore external or circular 
>>>> dependencies!), avoiding third party trust anchor, rekeying as good 
>>>> operational practice, not just compromises,  and other such 
>>>> arguments might be reinforced.
>> 
>> I added a reference to 6973.
>> 
>>>> S.3: Could include LCAF here, perhaps.
>> 
>> Added plus its reference.
>> 
>>>> S.4: You could probably strike this entire sentence and lessen 
>>>> confusion: "When an ETR (when it is also an ITR) encapsulates 
>>>> packets to this ITR (when it is also an ETR), a separate key 
>>>> exchange and shared-secret computation is performed.”
>> 
>> Okay, removed.
>> 
>>>> S.7: It’s unclear what constitutes “Diffie-Hellman *group*”.
>> 
>> I will change “group” to “parameters”.
>> 
>>>> 
>>>> S.7: s/the the/the/
>>>> 
>>>> S.7: s/integrity-check/integrity check/
>> 
>> Changed both.
>> 
>>>> S.8: Editors note to strike text in last paragraph here, unclear 
>>>> what resolution was from this text.
>> 
>> We allocated two new bits from a 3-bit reserved field now leaving 1 
>> reserve bit. I added that the reserved bit remaining is documented in 
>> RFC6830.
>> 
>>>> S.12.1: A reference to the SAAG comments might be useful here?
>> 
>> We don’t have one. But I will add a list of recommendations they 
>> provided.
>> 
>>>> S 13: Are you sure you want a default FCFS allocation policy here 
>>>> and not a slightly higher bar?
>> 
>> I have no opinion. What is the benefit on not doing FCFS?
>> 
>>>> Throughout: Consistent hyphenation in the document would help (e.g., 
>>>> “network-byte” ..).
>> 
>> Done.
>> 
>>>> Throughout: Expanding on first use of each acronym would be useful, 
>>>> perhaps with references.
>> 
>> Done.
>> 
>> A new revision is attached (plus a htmlized diff file). Let me know if 
>> you like the text and then I’ll submit -07.
>> 
>> Thanks again,
>> Dino & Brian
>> 
>> <rfcdiff.html><draft-ietf-lisp-crypto-07.txt>
>> 
>> 
>> 
>> 


From nobody Mon Sep 19 10:34:31 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9514212B10C; Mon, 19 Sep 2016 10:34:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GI1GPKUEKM_e; Mon, 19 Sep 2016 10:34:27 -0700 (PDT)
Received: from mail-pf0-x22b.google.com (mail-pf0-x22b.google.com [IPv6:2607:f8b0:400e:c00::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E965312B485; Mon, 19 Sep 2016 10:34:26 -0700 (PDT)
Received: by mail-pf0-x22b.google.com with SMTP id p64so53076750pfb.1; Mon, 19 Sep 2016 10:34:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=IkM93CjbL/OYK09qxWs2nZC74QievzRUHdZHKBDWQec=; b=PEUtehRwiVnMKUL1lEOFkW4uDqEBpMWMvdftpzncRLXmCvsA2ol9NdieRMcNWyARNv OFuE9yUX2M4sJfmzZ/EDi/tJ4cbFVNG2N0FbdocY16g/aE1qCoWUNAJhhYmSuTLGChhN k1v/9BS/+FQLrsRHwCptV5B3j2EFtzPpyWGo0+VEr7IUP+3rRt3CxjLh8xoZ7YKB06C9 0V4VC/CuBdem6jKA1QWS69vIsK5IAby921X04glQFAGdIIr4oVALi/+gBIjdMH/vWinV PE2j2NLZMB4V+PA3/58erulsoaGpiHASBel1EC2nbnva2OAqiUezndSkSthBNS4/VuWz lJtw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=IkM93CjbL/OYK09qxWs2nZC74QievzRUHdZHKBDWQec=; b=dKV5FUzj2L2+vNCJMJd2j2d2EhkfJRdVSlAJg3vIMcW0Jc70SX/ZdxGC0d9XRJLEAi GXodW5B80I5jdp/dhhj0MrRmaABzoWycl4A3TrlH5DaDIjs4ehIy+ioYLOZTubzfpbu/ eMVuVrSYoQIxqmm1keaZSnC8fnNKChlwbdLrlmO/R8lhHdElPCAGYG5LWQ/beVaRlyW+ s0IUuXYd7oA7maZ8lQLcHPcvwZEL15ynlHEyxbWEEqForpu/MfFBoFmbjNgQYiyhDF51 VzQN79bsTdAxBKN3/ycSiOawgFa0N8VjNTh0AsBsrXx5R4//y1Gl4MDlxxhmWFzfcKAJ fHtA==
X-Gm-Message-State: AE9vXwMBK6J0LYsFgZXrYKpdN7G4caTjAztfAQt84OMHTaRncRbBYn32QfEYNlrTIjbFpA==
X-Received: by 10.98.33.146 with SMTP id o18mr35269503pfj.177.1474306466504; Mon, 19 Sep 2016 10:34:26 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id i7sm33060649paf.9.2016.09.19.10.34.22 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 19 Sep 2016 10:34:25 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <d766e8102805db6fedefa3c5dbe1696a@tcb.net>
Date: Mon, 19 Sep 2016 10:34:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A15DE81B-5075-44CE-A01F-5468556D27E6@gmail.com>
References: <9a0ab6afeff3fc8b86cc320a757ccbf8@tcb.net> <C11A93C3-6334-42B4-B5A7-065E8725C5E7@gigix.net> <B5D701A0-6D12-436B-8091-3802662556C1@gmail.com> <AE095A9B-F7C7-46BE-89D7-C1224B314EE2@gmail.com> <d766e8102805db6fedefa3c5dbe1696a@tcb.net>
To: Danny McPherson <danny@tcb.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/WZvpcygEnG7Afu9eVZA1SEsEH5U>
Cc: zhang.xian@huawei.com, LISP mailing list list <lisp@ietf.org>, Jonathan.Hardwick@metaswitch.com, draft-ietf-lisp-crypto.authors@ietf.org, Jon Hudson <jon.hudson@gmail.com>
Subject: Re: [lisp] RTG-DIR REVIEW: draft-ietf-lisp-crypto-06.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 17:34:29 -0000

> Nothing more from me (although I don't think that's where you query =
was directed), all the changes look good.

The query was for you. I wanted you to agree to the changes before I =
posted the new version.

> On the IANA question, was simply a matter of if you want to require =
something more rigid v. the most lax codepoint allocation model, but I =
don't have any strong opinion there.

Okay, I will post right now.

Thanks all!

Dino

>=20
>=20
> -danny
>=20
> On 2016-09-19 12:06 PM, Dino Farinacci wrote:
>> Any status on this?
>> Dino
>>> On Sep 5, 2016, at 10:07 AM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>>> See responses inline. A new draft is attached (but not submitted =
since I had some open questions).
>>>>> Document: draft-ietf-lisp-crypto-06.txt
>>>>> Reviewer: Danny McPherson
>>>>> Review Date: August 24, 2016
>>>>> Intended Status: Experimental
>>> Thanks for the review Danny.
>>>>> Summary:
>>>>> I have some minor concerns about this document that should be =
considered before publication.
>>>>> Comments:
>>>>> I believe the draft is technically sound.
>>>>> Major Issues:
>>>>> I have no =E2=80=9CMajor=E2=80=9D issues with this I-D.
>>> Good to hear.
>>>>> Minor Issues:
>>>>> In the Security Considerations section a small amount of text =
might be useful that discusses end-end v. encryption from middle boxes, =
and the risks therein.  There are clearly benefits to this over no =
encryption, but there are risks about assumptions that may be made =
thereafter as well.
>>> I added some text. Please review.
>>>>> Nits:
>>>>> S.1: s/typically not modified.  Which means/typically not =
modified, which means/
>>> Changed.
>>>>> S.1: Is there in fact a case where asymmetries result in the =
*same* egress xTRs but different keys are used?  I believe this would =
just apply to "different xTRs", no?  :
>>> Right, when the same ETR is used by different ITRs to encapsulate =
traffic, different keys are used.
>>>>>       However, return traffic uses the same procedures but with =
different key values by the same xTRs or potentially different xTRs when =
the paths between LISP sites are asymmetric.
>>> Right, a unique set of keys are used for each {ITR, ETR} =
combination. Did you want me to say something specific here?
>>>>> S.1: Regarding "[t]his document has the following requirements for =
the solutions space", it might be useful to reference some general IETF =
privacy work, even RFC 6973 or the like.  Given that it's Experimental I =
think it's fine as is, but some references for the broader community may =
be in order.  In particular, references to not requiring a separate PKI =
(and therefore external or circular dependencies!), avoiding third party =
trust anchor, rekeying as good operational practice, not just =
compromises,  and other such arguments might be reinforced.
>>> I added a reference to 6973.
>>>>> S.3: Could include LCAF here, perhaps.
>>> Added plus its reference.
>>>>> S.4: You could probably strike this entire sentence and lessen =
confusion: "When an ETR (when it is also an ITR) encapsulates packets to =
this ITR (when it is also an ETR), a separate key exchange and =
shared-secret computation is performed.=E2=80=9D
>>> Okay, removed.
>>>>> S.7: It=E2=80=99s unclear what constitutes =E2=80=9CDiffie-Hellman =
*group*=E2=80=9D.
>>> I will change =E2=80=9Cgroup=E2=80=9D to =E2=80=9Cparameters=E2=80=9D.=

>>>>> S.7: s/the the/the/
>>>>> S.7: s/integrity-check/integrity check/
>>> Changed both.
>>>>> S.8: Editors note to strike text in last paragraph here, unclear =
what resolution was from this text.
>>> We allocated two new bits from a 3-bit reserved field now leaving 1 =
reserve bit. I added that the reserved bit remaining is documented in =
RFC6830.
>>>>> S.12.1: A reference to the SAAG comments might be useful here?
>>> We don=E2=80=99t have one. But I will add a list of recommendations =
they provided.
>>>>> S 13: Are you sure you want a default FCFS allocation policy here =
and not a slightly higher bar?
>>> I have no opinion. What is the benefit on not doing FCFS?
>>>>> Throughout: Consistent hyphenation in the document would help =
(e.g., =E2=80=9Cnetwork-byte=E2=80=9D ..).
>>> Done.
>>>>> Throughout: Expanding on first use of each acronym would be =
useful, perhaps with references.
>>> Done.
>>> A new revision is attached (plus a htmlized diff file). Let me know =
if you like the text and then I=E2=80=99ll submit -07.
>>> Thanks again,
>>> Dino & Brian
>>> <rfcdiff.html><draft-ietf-lisp-crypto-07.txt>


From nobody Mon Sep 19 10:40:46 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 620BB12B4A7; Mon, 19 Sep 2016 10:40:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.33.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147430684139.31156.13324742758206985320.idtracker@ietfa.amsl.com>
Date: Mon, 19 Sep 2016 10:40:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ISKOX1X62-YrEtG8LtAaamNgWL4>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-crypto-07.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 17:40:41 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Data-Plane Confidentiality
        Authors         : Dino Farinacci
                          Brian Weis
	Filename        : draft-ietf-lisp-crypto-07.txt
	Pages           : 19
	Date            : 2016-09-19

Abstract:
   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-crypto-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-crypto-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Sep 19 16:07:57 2016
Return-Path: <stig@venaas.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D839912B580 for <lisp@ietfa.amsl.com>; Mon, 19 Sep 2016 16:07:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=venaas-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S-4oe7ebDUWB for <lisp@ietfa.amsl.com>; Mon, 19 Sep 2016 16:07:50 -0700 (PDT)
Received: from mail-lf0-x22d.google.com (mail-lf0-x22d.google.com [IPv6:2a00:1450:4010:c07::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9DDB12B54B for <lisp@ietf.org>; Mon, 19 Sep 2016 16:07:46 -0700 (PDT)
Received: by mail-lf0-x22d.google.com with SMTP id l131so55510lfl.2 for <lisp@ietf.org>; Mon, 19 Sep 2016 16:07:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=venaas-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=KWEoakPNxyt7E70Tq26NlIO4ra/i9W/rrgRx03b3SFI=; b=E9SSJkRzGYZUD7LABoLABQ5pYgHfnUR6bBjAg60Htsw76XuvF/GDMViO7oYSLh7f76 CNo+VAEYKSHkcpNgw4bNXydEuHXHB6qZ1xmW3PJ8CVAAwV4mukdEVsND6AGsFfG7jNLj QTeY60rFu+nAPvWywhTGaSGrOpLCFGRVdolKttTr98RDLkY+vvnH3L/OKQ9W/YlwNpFG Jfpsw68qHHTiO5FDc0AphgXHAtfudmVzBvAwcwGBZJfTiaQ4lstrGsCsD5jX4lqKkKlx xb56r3aZYmGDrXmvq0u1MxcwGPo5rw++WafUQqMCyT6ssFxjktaKbaG6DUmC0gyzjhiu ErXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=KWEoakPNxyt7E70Tq26NlIO4ra/i9W/rrgRx03b3SFI=; b=LH8i6gXDqbg0EH7nd2wYbjx8v5k6y+k95ZseIPPgynCqg86s8cWxbTg/BoMbJbYQG3 M8KYGrMjQaZUxXu3bGh89Fg8yvu5RtG6j2ZAOPHvHqDT2VKrYX28y6HMh4K39Snv1N1l hYTRZkr5rU8iEHyxZlzwzYWPfvlfBonkcA6+/uuF4MjwkFNPkqtO1qec2Ek36D0c1+sZ F8CgQol62EVbuwFE5lOYMC66xYL0RtxSFN6ChI+17njoeteOK4CfxCeY9pEE9PVuxToa FCN9AgYdQWhTtChGgAAoS+OUKICW8Rq+mQkUZ/FRCIOxx5HdR9RJ0wA1ngaFy6XHhJON bS3w==
X-Gm-Message-State: AE9vXwP/ZUGSkyuwNMs+pUyqF8RXdKkTruQTD0VuuQB6Dsx+tE384B8sLBu7BeknCWO8bzEtL3f/HnKd0R0XQw==
X-Received: by 10.46.1.132 with SMTP id f4mr11609488lji.57.1474326464740; Mon, 19 Sep 2016 16:07:44 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.28.15 with HTTP; Mon, 19 Sep 2016 16:07:44 -0700 (PDT)
In-Reply-To: <606F6D6C-B9A9-402E-8C04-96EF867C6E89@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com> <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com> <606F6D6C-B9A9-402E-8C04-96EF867C6E89@gmail.com>
From: Stig Venaas <stig@venaas.com>
Date: Mon, 19 Sep 2016 16:07:44 -0700
Message-ID: <CAHANBtKD1BzaJhwM198gkqsha4ii9pfiEFK8mrcMgzhjmEzUiw@mail.gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ciVKoZ1LHSzY__bWPzaiWG4oSWs>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 23:07:54 -0000

Hi

The changes look good.

Stig


On Mon, Sep 19, 2016 at 8:54 AM, Dino Farinacci <farinacci@gmail.com> wrote=
:
>> On Sep 9, 2016, at 4:15 PM, Stig Venaas <stig@venaas.com> wrote:
>>
>>>> In section 3 we have this paragraph:
>>>>
>>>>  The Address Family AFI definitions from [AFI] only allocate code-
>>>>  points for the AFI value itself.  The length of the address or entity
>>>>  that follows is not defined and is implied based on conventional
>>>>  experience.  Where the LISP protocol uses LISP Canonical Addresses
>>>>  specifically, the address length definitions will be in this
>>>>  specification and take precedent over any other specification.
>>>>
>>>> I'm not sure what conventional experience means. Please try to find a
>>>
>>> Well like I said above, the AFI values defined in the AFI document are =
just type values and there is no length defined. So =E2=80=9Cconventional w=
isdom=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we know wh=
at follows is 4 bytes. Ditto for IPv6, MAC addresses, etc.
>>
>> In theory there should be standards/documents specifying this for each
>> of the address types, and maybe could write that people should see the
>> respective standards or something. I don't know if this exists for all
>> the types though.
>
> It does not. But how about I promise you that when there is a new use-cas=
e for a specific AFI, we=E2=80=99ll make sure that the AFI and its length a=
re defined in that use-case document.
>
> Like I said, we have this for AFI=3D17 already. So I have already set an =
example.
>
>>> better way to say it. Regarding the last sentence, what if a you want
>>>> to define new LCAF encodings in the future? Is it good to say that thi=
s
>>>> specification takes precedent over any other?
>>>
>>> LCAF encodings and definitions do not change the length of an AFI encod=
ed address. So I am not sure what you mean.
>>
>> The last sentence says "Where the LISP protocol uses LISP Canonical
>> Addresses specifically, the address length definitions will be in this
>> specification and take precedent over any other specification.". What
>> if you in the future would like to write a separate specification that
>> defines additional LISP Canonical address formats?
>
> Okay, I have clarified that new LCAFs that are defined in other documents=
 will specify length and formatting definitions.
>
>>> In section 3 we have this paragraph:
>>>>
>>>>  Length:  this 16-bit field is in units of bytes and covers all of the
>>>>     LISP Canonical Address payload, starting and including the byte
>>>>     after the Length field.  So any LCAF encoded address will have a
>>>>     minimum length of 8 bytes when the Length field is 0.  The 8 bytes
>>>>     include the AFI, Flags, Type, Reserved, and Length fields.  When
>>>>     the AFI is not next to encoded address in a control message, then
>>>>     the encoded address will have a minimum length of 6 bytes when the
>>>>     Length field is 0.  The 6 bytes include the Flags, Type, Reserved,
>>>>     and Length fields.
>>>>
>>>> Can you phrase this differently? First it says that any LCAF encoded
>>>
>>> No not really. It is precise up to the sentence =E2=80=9CWhen the AFI i=
s not ..=E2=80=9D.
>>>
>>>> address has a minimum length of 8, but then it goes on to say how it
>>>> sometimes is only 6. I understand what you're trying to say, but there
>>>> may be a better way of stating it.
>>>
>>> This special case is for some LISP control-messages where the AFI is an=
other place in the message but the address is somewhere else. Rather than h=
ave the AFI appear twice, the LCAF length needs to be different.
>>>
>>> The length field always includes the entire contiguous set of LCAF byte=
s including type, flags, length field, etc.
>>>
>>> The language is precise and accurate. Let me know how you think stating=
 what I did in this comment response can be put in without writing a lot of=
 text about a special case.
>>
>> The problem I see is that first you write "So any LCAF encoded address
>> will have a minimum length of 8 bytes when the Length field is 0." and
>> then you write "then the encoded address will have a minimum length of
>> 6 bytes when the Length field is 0." I understand what you mean, but I
>> feel this is a bit confusing.
>>
>> Maybe you could say something like:
>>
>> When including the AFI, an LCAF encoded address will have a minimum
>> length of 8 bytes when the Length field is 0. Or start by saying that
>> the minimal length is 6, and then say that it will then be 8 when the
>> AFI is included.
>
> Changed to add your suggestion. Thanks.
>
>>>> Section 4.10
>>>> In this section there are several examples of using the AFI List Type,
>>>> but I miss a general definition. It appears that there can be a variab=
le
>>>> number of AFIs in the list. Any number > 0? It might be useful to have
>>>
>>> Yes, a variable number.
>>
>> How about adding a few lines of text to 4.10 saying that you can have
>> a variable number etc., explaining briefly what the general format is.
>> And then say that what follows are examples?
>
> Done.
>
>> Section 4.10.3
>>>> Isn't it unusual to include the 0 termination? Since you know the
>>>> length it is not really needed. When parsing one will need to check
>>>> the length either way, what should one do it the string accidentally
>>>> is not 0-terminated?
>>>
>>> Well the AFI definition in [AFI] doesn=E2=80=99t say how to terminate t=
he string. But the length field will imply it. However, I wrote the =E2=80=
=9Cdistinguished-name=E2=80=9D draft to specify when AFI=3D17 is used (not =
only in a LCAF but by itself), how to terminate the string. I could include=
 that reference, but that draft is not a working group document.
>>>
>>> So please advise.
>>
>> Currently it says:
>>
>>   Length value n:  length in bytes AFI=3D17 field and the null-terminate=
d
>>      ASCII string (the last byte of 0 is included).
>>
>> It might make sense to 0 terminate the DN in some cases, but at least
>> here we know the string length from the value of n, so I think it
>> would be better to drop it here. And as I mentioned, you cannot rely
>> on the 0 for parsing, to be on the safe side you would use n anyway.
>
> You want to terminate the string in all cases. Because there are cases wh=
ere AFI=3D17 is not used inside an LCAF encoding. And where there is no len=
gth to convey the string length. And the Distinguished-Name use-case Intern=
et Draft specs this for both LCAF and non-LCAF applications.
>
>>>> Section 7
>>>> It looks like the table in the IANA considerations doesn't include all
>>>> the types defined in this document.
>>>
>>> That was done intentionally. The ones that are experimental are not in =
this section 7 list because there is no use-case document for it yet. Maybe=
 the chairs can explain this better than me.
>>
>> I think it's still useful. If someone sees the type used, they can
>> look it up in the registry. It also helps avoid that someone perhaps
>> tries to reuse one of these types in new documents. If you really want
>> to use one of the code points for something else in the future, a new
>> document could always update the registry.
>
> Did Luigi=E2=80=99s response satisfy your comment?
>
>> BTW, it also makes me wonder if it is worth reserving any LCAF types
>> for experiments.
>
> The space is large enough for FCFS.
>
>> Regards,
>> Stig
>
> See new version enclosed. Let me know when I can post it if you like the =
changes.
>
> Thanks again,
> Dino
>
>
>
>
>
>
>
>


From nobody Mon Sep 19 17:06:01 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1951312B510; Mon, 19 Sep 2016 17:05:56 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.33.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147432995610.31141.12884978869207734259.idtracker@ietfa.amsl.com>
Date: Mon, 19 Sep 2016 17:05:56 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/H2I9ahgnt0_wLB8FhSC2GDi_Gwo>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-lcaf-15.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2016 00:05:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Canonical Address Format (LCAF)
        Authors         : Dino Farinacci
                          Dave Meyer
                          Job Snijders
	Filename        : draft-ietf-lisp-lcaf-15.txt
	Pages           : 43
	Date            : 2016-09-19

Abstract:
   This draft defines a canonical address format encoding used in LISP
   control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-lcaf/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-lcaf-15

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-lcaf-15


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Sep 19 17:06:51 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 697EE12B04C; Mon, 19 Sep 2016 17:06:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6qstOtBH0rLL; Mon, 19 Sep 2016 17:06:45 -0700 (PDT)
Received: from mail-pf0-x229.google.com (mail-pf0-x229.google.com [IPv6:2607:f8b0:400e:c00::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5847E12B03B; Mon, 19 Sep 2016 17:06:45 -0700 (PDT)
Received: by mail-pf0-x229.google.com with SMTP id 21so508195pfy.0; Mon, 19 Sep 2016 17:06:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ej/NgXIKuNaGm6FTvH5CnHjlXs/HkuPCDh29wUxJjx8=; b=GxkEvjeDop4m3/dqalC56DaAsUm+YCqrzdMnroKnjXkPCwOJ4ri/nS7gRUl7/JzMD2 Rf++GH5LTvd72A4fyI/5X/0StRxC/HOf17VwRwmUujBUVGQpi5q4nRCAlsCxU2LSG+v0 d96y1CSM4ivtxVxQVMOJylYIrNeb/FPJAG8a/+Gq8C8nC56CQ4s9zHUxPheJXPAqsFFb BYNSks7cHmypAUJyVJ+fbfIo4gpti5qQqj6niHBMVGCIgp7FZo5AANCCgDP/YqdRvb2J D3Dspfm7ZohVL7UqaHkN/WMGkcvKxqXv3+46hVCQWr/hJpwUgSnaCJSHXErTtm5ideK4 rHcQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ej/NgXIKuNaGm6FTvH5CnHjlXs/HkuPCDh29wUxJjx8=; b=lHBsKuBpB6cIZeezV/qJxZCtUjdQBVV7D9/XFaCnY5Jk7uYOXWl5rwMGjpn5m6BNtl hCktfDKaVaKATUmC3EeDSdjCaJnfOPIswTFxENYTorp4JyXQyyh7B9t5KFlLCcyRO/u2 vQZhF3S5j22QncZwKsKddaaf30m672ZlcEkAJrYDFenfXUw0SwmJ2OfHv+3joFMzdAMk 6yyAzzgeVEG9lDMnAnyN+8hgSiLRMJZzRX5LIZzRVIoIqaOPxzsawqJNvIRHIXUETzns sYivdsFjnx1eV5juUzjzV/7tsa/WbIk1AtghrQNmejoZcy/ttKBJt0UGnkdHP9xcg3rD tt/w==
X-Gm-Message-State: AE9vXwNKYify1feM9rNkjuemc5Km0ti/QGIHpTWrM9ofAqXvYK0U5Wpyag+iOi5Sw+bcuA==
X-Received: by 10.98.99.67 with SMTP id x64mr50941910pfb.26.1474330004941; Mon, 19 Sep 2016 17:06:44 -0700 (PDT)
Received: from ?IPv6:2601:646:8d01:89f0:a105:345:d1c0:66ba? ([2601:646:8d01:89f0:a105:345:d1c0:66ba]) by smtp.gmail.com with ESMTPSA id 21sm25747662pfo.80.2016.09.19.17.06.44 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 19 Sep 2016 17:06:44 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CAHANBtKD1BzaJhwM198gkqsha4ii9pfiEFK8mrcMgzhjmEzUiw@mail.gmail.com>
Date: Mon, 19 Sep 2016 17:06:43 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <2A6FBD83-97A1-45F9-8875-81CF6FE5B7E8@gmail.com>
References: <CAHANBt+rK8o9shhvWq9CZf89psLtzyYXJ-9F7KrCmF_w396YJQ@mail.gmail.com> <551BDE7B-6BA3-4336-B92A-395FBE4A571D@gmail.com> <CAHANBtJHu47W-BKjVrykTaM-dXAyerPF44Qif4a0HHJNAD7eTg@mail.gmail.com> <606F6D6C-B9A9-402E-8C04-96EF867C6E89@gmail.com> <CAHANBtKD1BzaJhwM198gkqsha4ii9pfiEFK8mrcMgzhjmEzUiw@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/gtIqbHgesAcuAKte2OZEOxFDzl0>
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, LISP mailing list list <lisp@ietf.org>, draft-ietf-lisp-lcaf.all@ietf.org
Subject: Re: [lisp] RtgDir review: draft-ietf-lisp-lcaf-14.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2016 00:06:47 -0000

-15 posted. Thanks a lot Stig!

Dino

> On Sep 19, 2016, at 4:07 PM, Stig Venaas <stig@venaas.com> wrote:
>=20
> Hi
>=20
> The changes look good.
>=20
> Stig
>=20
>=20
> On Mon, Sep 19, 2016 at 8:54 AM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>>> On Sep 9, 2016, at 4:15 PM, Stig Venaas <stig@venaas.com> wrote:
>>>=20
>>>>> In section 3 we have this paragraph:
>>>>>=20
>>>>> The Address Family AFI definitions from [AFI] only allocate code-
>>>>> points for the AFI value itself.  The length of the address or =
entity
>>>>> that follows is not defined and is implied based on conventional
>>>>> experience.  Where the LISP protocol uses LISP Canonical Addresses
>>>>> specifically, the address length definitions will be in this
>>>>> specification and take precedent over any other specification.
>>>>>=20
>>>>> I'm not sure what conventional experience means. Please try to =
find a
>>>>=20
>>>> Well like I said above, the AFI values defined in the AFI document =
are just type values and there is no length defined. So =E2=80=9Cconventio=
nal wisdom=E2=80=9D means that if a spec says an AFI value 1 is IPv4, we =
know what follows is 4 bytes. Ditto for IPv6, MAC addresses, etc.
>>>=20
>>> In theory there should be standards/documents specifying this for =
each
>>> of the address types, and maybe could write that people should see =
the
>>> respective standards or something. I don't know if this exists for =
all
>>> the types though.
>>=20
>> It does not. But how about I promise you that when there is a new =
use-case for a specific AFI, we=E2=80=99ll make sure that the AFI and =
its length are defined in that use-case document.
>>=20
>> Like I said, we have this for AFI=3D17 already. So I have already set =
an example.
>>=20
>>>> better way to say it. Regarding the last sentence, what if a you =
want
>>>>> to define new LCAF encodings in the future? Is it good to say that =
this
>>>>> specification takes precedent over any other?
>>>>=20
>>>> LCAF encodings and definitions do not change the length of an AFI =
encoded address. So I am not sure what you mean.
>>>=20
>>> The last sentence says "Where the LISP protocol uses LISP Canonical
>>> Addresses specifically, the address length definitions will be in =
this
>>> specification and take precedent over any other specification.". =
What
>>> if you in the future would like to write a separate specification =
that
>>> defines additional LISP Canonical address formats?
>>=20
>> Okay, I have clarified that new LCAFs that are defined in other =
documents will specify length and formatting definitions.
>>=20
>>>> In section 3 we have this paragraph:
>>>>>=20
>>>>> Length:  this 16-bit field is in units of bytes and covers all of =
the
>>>>>    LISP Canonical Address payload, starting and including the byte
>>>>>    after the Length field.  So any LCAF encoded address will have =
a
>>>>>    minimum length of 8 bytes when the Length field is 0.  The 8 =
bytes
>>>>>    include the AFI, Flags, Type, Reserved, and Length fields.  =
When
>>>>>    the AFI is not next to encoded address in a control message, =
then
>>>>>    the encoded address will have a minimum length of 6 bytes when =
the
>>>>>    Length field is 0.  The 6 bytes include the Flags, Type, =
Reserved,
>>>>>    and Length fields.
>>>>>=20
>>>>> Can you phrase this differently? First it says that any LCAF =
encoded
>>>>=20
>>>> No not really. It is precise up to the sentence =E2=80=9CWhen the =
AFI is not ..=E2=80=9D.
>>>>=20
>>>>> address has a minimum length of 8, but then it goes on to say how =
it
>>>>> sometimes is only 6. I understand what you're trying to say, but =
there
>>>>> may be a better way of stating it.
>>>>=20
>>>> This special case is for some LISP control-messages where the AFI =
is another place in the message but the address is somewhere else. =
Rather than have the AFI appear twice, the LCAF length needs to be =
different.
>>>>=20
>>>> The length field always includes the entire contiguous set of LCAF =
bytes including type, flags, length field, etc.
>>>>=20
>>>> The language is precise and accurate. Let me know how you think =
stating what I did in this comment response can be put in without =
writing a lot of text about a special case.
>>>=20
>>> The problem I see is that first you write "So any LCAF encoded =
address
>>> will have a minimum length of 8 bytes when the Length field is 0." =
and
>>> then you write "then the encoded address will have a minimum length =
of
>>> 6 bytes when the Length field is 0." I understand what you mean, but =
I
>>> feel this is a bit confusing.
>>>=20
>>> Maybe you could say something like:
>>>=20
>>> When including the AFI, an LCAF encoded address will have a minimum
>>> length of 8 bytes when the Length field is 0. Or start by saying =
that
>>> the minimal length is 6, and then say that it will then be 8 when =
the
>>> AFI is included.
>>=20
>> Changed to add your suggestion. Thanks.
>>=20
>>>>> Section 4.10
>>>>> In this section there are several examples of using the AFI List =
Type,
>>>>> but I miss a general definition. It appears that there can be a =
variable
>>>>> number of AFIs in the list. Any number > 0? It might be useful to =
have
>>>>=20
>>>> Yes, a variable number.
>>>=20
>>> How about adding a few lines of text to 4.10 saying that you can =
have
>>> a variable number etc., explaining briefly what the general format =
is.
>>> And then say that what follows are examples?
>>=20
>> Done.
>>=20
>>> Section 4.10.3
>>>>> Isn't it unusual to include the 0 termination? Since you know the
>>>>> length it is not really needed. When parsing one will need to =
check
>>>>> the length either way, what should one do it the string =
accidentally
>>>>> is not 0-terminated?
>>>>=20
>>>> Well the AFI definition in [AFI] doesn=E2=80=99t say how to =
terminate the string. But the length field will imply it. However, I =
wrote the =E2=80=9Cdistinguished-name=E2=80=9D draft to specify when =
AFI=3D17 is used (not only in a LCAF but by itself), how to terminate =
the string. I could include that reference, but that draft is not a =
working group document.
>>>>=20
>>>> So please advise.
>>>=20
>>> Currently it says:
>>>=20
>>>  Length value n:  length in bytes AFI=3D17 field and the =
null-terminated
>>>     ASCII string (the last byte of 0 is included).
>>>=20
>>> It might make sense to 0 terminate the DN in some cases, but at =
least
>>> here we know the string length from the value of n, so I think it
>>> would be better to drop it here. And as I mentioned, you cannot rely
>>> on the 0 for parsing, to be on the safe side you would use n anyway.
>>=20
>> You want to terminate the string in all cases. Because there are =
cases where AFI=3D17 is not used inside an LCAF encoding. And where =
there is no length to convey the string length. And the =
Distinguished-Name use-case Internet Draft specs this for both LCAF and =
non-LCAF applications.
>>=20
>>>>> Section 7
>>>>> It looks like the table in the IANA considerations doesn't include =
all
>>>>> the types defined in this document.
>>>>=20
>>>> That was done intentionally. The ones that are experimental are not =
in this section 7 list because there is no use-case document for it yet. =
Maybe the chairs can explain this better than me.
>>>=20
>>> I think it's still useful. If someone sees the type used, they can
>>> look it up in the registry. It also helps avoid that someone perhaps
>>> tries to reuse one of these types in new documents. If you really =
want
>>> to use one of the code points for something else in the future, a =
new
>>> document could always update the registry.
>>=20
>> Did Luigi=E2=80=99s response satisfy your comment?
>>=20
>>> BTW, it also makes me wonder if it is worth reserving any LCAF types
>>> for experiments.
>>=20
>> The space is large enough for FCFS.
>>=20
>>> Regards,
>>> Stig
>>=20
>> See new version enclosed. Let me know when I can post it if you like =
the changes.
>>=20
>> Thanks again,
>> Dino
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20
>>=20


From nobody Tue Sep 20 12:24:04 2016
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 24CFB12B168; Tue, 20 Sep 2016 12:24:01 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.33.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
Message-ID: <147439944110.27740.4142750420169987842.idtracker@ietfa.amsl.com>
Date: Tue, 20 Sep 2016 12:24:01 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/w68GHndaX20esujrEj6hZ3JV8gk>
Cc: lisp-chairs@ietf.org, draft-ietf-lisp-crypto@ietf.org, lisp@ietf.org
Subject: [lisp] Last Call: <draft-ietf-lisp-crypto-07.txt> (LISP Data-Plane Confidentiality) to Experimental RFC
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: ietf@ietf.org
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2016 19:24:03 -0000

The IESG has received a request from the Locator/ID Separation Protocol
WG (lisp) to consider the following document:
- 'LISP Data-Plane Confidentiality'
  <draft-ietf-lisp-crypto-07.txt> as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-10-04. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/ballot/


No IPR declarations have been submitted directly on this I-D.





From nobody Tue Sep 20 12:25:30 2016
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C044412B481; Tue, 20 Sep 2016 12:25:23 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.33.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
Message-ID: <147439952378.27640.3281258876415640474.idtracker@ietfa.amsl.com>
Date: Tue, 20 Sep 2016 12:25:23 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/PkC4oqoeHfThY6a0tInEMmssRdQ>
Cc: lisp-chairs@ietf.org, draft-ietf-lisp-lcaf@ietf.org, lisp@ietf.org
Subject: [lisp] Last Call: <draft-ietf-lisp-lcaf-15.txt> (LISP Canonical Address Format (LCAF)) to Experimental RFC
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: ietf@ietf.org
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2016 19:25:24 -0000

The IESG has received a request from the Locator/ID Separation Protocol
WG (lisp) to consider the following document:
- 'LISP Canonical Address Format (LCAF)'
  <draft-ietf-lisp-lcaf-15.txt> as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-10-04. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This draft defines a canonical address format encoding used in LISP
   control messages and in the encoding of lookup keys for the LISP
   Mapping Database System.





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lisp-lcaf/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-lisp-lcaf/ballot/


No IPR declarations have been submitted directly on this I-D.





From nobody Wed Sep 21 14:13:06 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA10512B489; Wed, 21 Sep 2016 14:13:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8ddPQfWIA1m; Wed, 21 Sep 2016 14:13:00 -0700 (PDT)
Received: from mail-pf0-x22c.google.com (mail-pf0-x22c.google.com [IPv6:2607:f8b0:400e:c00::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 604DB12B5D4; Wed, 21 Sep 2016 14:13:00 -0700 (PDT)
Received: by mail-pf0-x22c.google.com with SMTP id 21so22938680pfy.0; Wed, 21 Sep 2016 14:13:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-transfer-encoding:subject:date:message-id:cc:to :mime-version; bh=7CqhoQ7jLU5nZHkS9JzT/cSK5qyxv9XnkGiJzlAV/I8=; b=lGSJQ8LgIgVViOtCRMO0v8jMzGFF1Vsna0JnIRycB4sQxRSWAVdQMEYBP+VHL6v07F ERdj6bbWUaWUzL5WIReXch6dtJxztAav62Zp1AXFPYYRRMwNv4AopNr9LZEkAELWJWbx ajU77Lv8+8zLM7tIU9akjXHXwqQ7nYvpUKs4sAr5/zvVl5+kLzjajrccsdhBYxhjP5am xAMfBi1YsaI/ZVQJuXcx3w5Q9g7igu1G9lTukV4kThxKQNx9/U7+M4tdaFGgin3XhBH8 jpqPhztVaxWd/SUocDtnB3G79lPLnBSZSICkRFrEt2nPQQui5ObD17DTk0u0MtCUDeNw 2mvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:content-transfer-encoding:subject:date :message-id:cc:to:mime-version; bh=7CqhoQ7jLU5nZHkS9JzT/cSK5qyxv9XnkGiJzlAV/I8=; b=ZwMqzM8HcL888kww9EwWbjNwkBNELHlBC8duMxoj+TYetT0XdvRDd1OIqsfe12qYvx KyBrljB7xJqemd6B5+oovAQQnxgjKBubaWQu0l4lMsH4JqQkRblB7mj81KrJzecF2Db0 /5cniUwBKqmBD+wy/0Iwv7EuoTg4+kPEm2IOW572+HLQZOtdolHpLwa0DHxv3dVOnFtV nyMcH6tIuVjn/RV1O00NmQUvlpVA2vl403Zi9eHYV4mIc8QvOCShdSnBi+Cz6caxFNpZ +fqlQ0iAWSNj1vE9dciAx8i/lKFtF9iCjpNdhjagCp12Y5wPdY6WMqvEJXkRTEJIXaMm Apzw==
X-Gm-Message-State: AE9vXwP9zyZ39d0nqEPE+SajpldWNwVYKwIaGfGkFgOn7ynwoenqtdlNuZFAk+yunPIq5w==
X-Received: by 10.98.71.5 with SMTP id u5mr67415318pfa.98.1474492380001; Wed, 21 Sep 2016 14:13:00 -0700 (PDT)
Received: from [172.31.98.172] (mobile-166-184-174-155.mycingular.net. [166.184.174.155]) by smtp.gmail.com with ESMTPSA id y1sm44285pfd.90.2016.09.21.14.12.58 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 21 Sep 2016 14:12:58 -0700 (PDT)
From: Dino Farinacci <farinacci@gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Date: Wed, 21 Sep 2016 14:12:57 -0700
Message-Id: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com>
To: ideas@ietf.org
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/Sb3YLE5s_7sGLa8rceENtwLrZeI>
Cc: beta@lispers.net, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, lisp-alpha@external.cisco.com, LISPmob <users@lispmob.org>, 5gangip@ietf.org, lisp-ops@external.cisco.com
Subject: [lisp] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Sep 2016 21:13:02 -0000

Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a =
section on mapping system requirements for map-n-encap and translation =
based loc/id split protocols. Rather than having you go into the =
document in detail (we wish you would and comment though), I will =
provide the short list below to attempt a discussion on requirements.=20

I have copied the possible WGs that may want to use the mapping system =
technology. And I have also copied the LISP working group who can shed =
expertise on the subject as well as some beta lists that have some =
operational experiences with mapping database deployment and management.

The requirements below have a security and robustness twist to it but I =
think that is the best place to start and to consider security =E2=80=9Cup=
 front=E2=80=9D.

Thanks in advance,
Dino

----

6.4.  Mapping System Security

   The secure mapping system must have the following requirements:

   1.  The components of the mapping system need to be robust against
       direct and indirect attacks.  If any component is attacked, the
       rest of the system should act with integrity and scale and only
       the information associated with the compromised component is made
       unavailable.

   2.  The addition and removal of components of the mapping system must
       be performed in a secure matter so as to not violate the
       integrity and operation of the system and service it provides.

   3.  The information returned by components of the mapping system
       needs to be authenticated as to detect spoofing from
       masqueraders.

   4.  Information registered (by publishers) to the mapping system must
       be authenticated so the registering entity or the information is
       not spoofed.

   5.  The mapping system must allow request access (for subscribers) to
       be open and public.  However, it is optional to provide
       confidentiality and authentication of the requesters and the
       information they are requesting.

   6.  Any information provided by components of the mapping system must
       be cryptographically signed by the provider and verified by the
       consumer.

   7.  Message rate-limiting and other heuristics must be part of the
       foundational support of the mapping system to protect the system
       from invalid overloaded conditions.

   8.  The mapping system should support some form of provisioned
       policy.  Either internal to the system or via mechanisms for
       users of the system to describe policy rules.  Access control
       should not use traditional granular-based access lists since they
       do not scale and are hard to manage.  By the use of token- or
       key- based authentication methods as well as deploying multiple
       instances of the mapping system will allow acceptable policy
       profiles.  Machine learning techniques could automate these
       mechanisms.=


From nobody Wed Sep 21 15:51:36 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A90A12B827; Wed, 21 Sep 2016 15:51:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nAYlMhHarPYB; Wed, 21 Sep 2016 15:51:29 -0700 (PDT)
Received: from mail-pf0-x22e.google.com (mail-pf0-x22e.google.com [IPv6:2607:f8b0:400e:c00::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB25912BC9F; Wed, 21 Sep 2016 15:51:09 -0700 (PDT)
Received: by mail-pf0-x22e.google.com with SMTP id z123so23616054pfz.2; Wed, 21 Sep 2016 15:51:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=SdhnoqxT3CNMkc/RcMhr4ychF7tdTd2S5noYF4lz7sI=; b=s7UD2Q1mBZKtvJDT1ulH/C/wNaLQoWyXmxCIkJe28+7y6WtQn9i8QhUq49JftFBMC5 oOtcwtfEtOHA585Vxeic84EAncTtMNCrDjCukx0XExRQdTNWXA4MmjxWCnWAXxoKZonR 6SI9G1RBlNMgjLwhIX169FrL7jPqvenR90nG77Cf7azyrhi23exlE/kwzP3sP64pJth3 YBPc3RsYHEMzbrTFO2lwtSVTXKVl9CSLpTHUUcWJYpl+G8dr7qQmX2SARwXZkOx8t5y5 utOPBgyPecGs217fFDAx2UP7teE2zfQ6R5Vx513+vEdwLFOaV9WKofqlESIN0C74uEno yCXw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=SdhnoqxT3CNMkc/RcMhr4ychF7tdTd2S5noYF4lz7sI=; b=mSVmOabqvbJ0GABeE6iTzHPb2isvdaeAjyP0JAOTbTsVSpANiM3jLzfV4fLZHwZMbb 5ne0u4taz9yb6bf5vzpPdrG9FvRz+9cnir36PawO0HwRtByAqQaIqNlE+/qo34Pv9ZKz vdV7jh6xE/EsLUFbQkd+9bLjddnmrGauWTKIxFuR9nnuiO8Bb0KH8TbtVS8wUurDfNmM JjVf/fH4abv0DeR5VSG1VLQE60DhbSl6Xp+EMN0vsrjKuCOLUMayhdFyo18fEcIBqYpx 05HgPYC8j3h3ti0WIO5jipeOzWUQONvDDQ7Aat3B5+iDLYisPWWj8yBCeqmNmvbeI9To akFw==
X-Gm-Message-State: AE9vXwNIxL6jIiKLLmFTFS+5+GzUJsemK5bhcShUnUveEkQB3DgleveieIlkmoO0bIp3vg==
X-Received: by 10.98.58.65 with SMTP id h62mr69173756pfa.82.1474498269520; Wed, 21 Sep 2016 15:51:09 -0700 (PDT)
Received: from ?IPv6:2601:646:8d01:89f0:1d22:29e0:ddaa:5135? ([2601:646:8d01:89f0:1d22:29e0:ddaa:5135]) by smtp.gmail.com with ESMTPSA id f202sm282204pfa.12.2016.09.21.15.51.08 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 21 Sep 2016 15:51:08 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com>
Date: Wed, 21 Sep 2016 15:51:07 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/wi9rmqDnYdnSdXURnQN1807IQLQ>
Cc: beta@lispers.net, ideas@ietf.org, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, LISPmob <users@lispmob.org>, 5gangip@ietf.org, lisp-beta@external.cisco.com
Subject: Re: [lisp] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Sep 2016 22:51:31 -0000

Reposting since the cisco mailing lists are no longer in service. Please =
respond to this email.

Thanks and sorry for inconvenience,
Dino

> On Sep 21, 2016, at 2:12 PM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>=20
> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a =
section on mapping system requirements for map-n-encap and translation =
based loc/id split protocols. Rather than having you go into the =
document in detail (we wish you would and comment though), I will =
provide the short list below to attempt a discussion on requirements.=20
>=20
> I have copied the possible WGs that may want to use the mapping system =
technology. And I have also copied the LISP working group who can shed =
expertise on the subject as well as some beta lists that have some =
operational experiences with mapping database deployment and management.
>=20
> The requirements below have a security and robustness twist to it but =
I think that is the best place to start and to consider security =E2=80=9C=
up front=E2=80=9D.
>=20
> Thanks in advance,
> Dino
>=20
> ----
>=20
> 6.4.  Mapping System Security
>=20
>   The secure mapping system must have the following requirements:
>=20
>   1.  The components of the mapping system need to be robust against
>       direct and indirect attacks.  If any component is attacked, the
>       rest of the system should act with integrity and scale and only
>       the information associated with the compromised component is =
made
>       unavailable.
>=20
>   2.  The addition and removal of components of the mapping system =
must
>       be performed in a secure matter so as to not violate the
>       integrity and operation of the system and service it provides.
>=20
>   3.  The information returned by components of the mapping system
>       needs to be authenticated as to detect spoofing from
>       masqueraders.
>=20
>   4.  Information registered (by publishers) to the mapping system =
must
>       be authenticated so the registering entity or the information is
>       not spoofed.
>=20
>   5.  The mapping system must allow request access (for subscribers) =
to
>       be open and public.  However, it is optional to provide
>       confidentiality and authentication of the requesters and the
>       information they are requesting.
>=20
>   6.  Any information provided by components of the mapping system =
must
>       be cryptographically signed by the provider and verified by the
>       consumer.
>=20
>   7.  Message rate-limiting and other heuristics must be part of the
>       foundational support of the mapping system to protect the system
>       from invalid overloaded conditions.
>=20
>   8.  The mapping system should support some form of provisioned
>       policy.  Either internal to the system or via mechanisms for
>       users of the system to describe policy rules.  Access control
>       should not use traditional granular-based access lists since =
they
>       do not scale and are hard to manage.  By the use of token- or
>       key- based authentication methods as well as deploying multiple
>       instances of the mapping system will allow acceptable policy
>       profiles.  Machine learning techniques could automate these
>       mechanisms.


From nobody Wed Sep 21 16:21:15 2016
Return-Path: <David.Black@dell.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28B7912B529; Wed, 21 Sep 2016 16:20:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.721
X-Spam-Level: 
X-Spam-Status: No, score=-2.721 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); domainkeys=fail (1024-bit key) reason="fail (message has been altered)" header.from=David.Black@dell.com header.d=dell.com; dkim=pass (1024-bit key) header.d=dell.com header.b=KLH92tIG; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=Ho8eafmE
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FbBMnxz2LfH1; Wed, 21 Sep 2016 16:20:55 -0700 (PDT)
Received: from esa7.dell-outbound.iphmx.com (esa7.dell-outbound.iphmx.com [68.232.153.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F1A612D0AF; Wed, 21 Sep 2016 16:19:28 -0700 (PDT)
DomainKey-Signature: s=smtpout; d=dell.com; c=simple; q=dns; h=Received:From:Cc:Received:Received:X-DKIM:DKIM-Signature: X-DKIM:Received:Received:Received:To:Subject:Thread-Topic: Thread-Index:Date:Message-ID:References:In-Reply-To: Accept-Language:Content-Language:X-MS-Has-Attach: X-MS-TNEF-Correlator:x-originating-ip:Content-Type: Content-Transfer-Encoding:MIME-Version: X-Sentrion-Hostname:X-RSA-Classifications; b=L8uDuKzOgP5g5DeQEDdtYLlfS8pqUGPUOvHfEf8vSOTLEpm4U1sqE1L0 XUfzh2Mrbl9JFOKItQ7n4u+bB/4mJatG5pF7L10GwZJTO5xxm1VHIg0tO aN2qnMuhr+A4wafzn/hO4Q2ngo7/u2TgX1Kj12ca7OD06kDxwQjimscCk 8=;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1474499968; x=1506035968; h=from:cc:to:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=MFVfshT1pRRbudRcBycS1hU092ICxV9K9kTBsvTfjh8=; b=KLH92tIGqhodqVhYZLmwiluINjhtUlDfAqRyxUDNWziEVFqfqppjW2Iu Er204mk13OVrHq4nZJFbgZUH7z8Vdj2q/K3TyeBTj6slDcBC964F1k5T8 tKNKp4vSu6WcjLQvRgFJq8sfYYxXRTlTXVfOzqcDnrN9hs1WvjP9r2KNf s=;
Received: from esa5.dell-outbound2.iphmx.com ([68.232.153.203]) by esa7.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Sep 2016 18:19:26 -0500
From: "Black, David" <David.Black@dell.com>
Received: from mailuogwhop.emc.com ([168.159.213.141]) by esa5.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Sep 2016 05:19:25 +0600
Received: from maildlpprd04.lss.emc.com (maildlpprd04.lss.emc.com [10.253.24.36]) by mailuogwprd01.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id u8LNJMlF019502 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 21 Sep 2016 19:19:24 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd01.lss.emc.com u8LNJMlF019502
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1474499964; bh=9xewPXR6x/UdLoAcMFF4NguhZE4=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=Ho8eafmEM9YMcj/WtW4HbeAQPn39g3UycjM+HWsb4eHCYxftLDdg7Ta+betIuazx1 xpV4KcCvRvl6Yc2YixE56ZnPOCiFzPpYFvu+5gcASfDbS2MxaU1W+K0ki/PfunZuUC Mn8VQW9bNNnQQc6UGE4uTqsTQrf5kmpzMpjRMH28=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd01.lss.emc.com u8LNJMlF019502
Received: from mailusrhubprd02.lss.emc.com (mailusrhubprd02.lss.emc.com [10.253.24.20]) by maildlpprd04.lss.emc.com (RSA Interceptor); Wed, 21 Sep 2016 19:18:38 -0400
Received: from MXHUB319.corp.emc.com (MXHUB319.corp.emc.com [10.146.3.97]) by mailusrhubprd02.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id u8LNJ1gZ001801 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Wed, 21 Sep 2016 19:19:01 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB319.corp.emc.com ([10.146.3.97]) with mapi id 14.03.0266.001; Wed, 21 Sep 2016 19:19:01 -0400
To: Dino Farinacci <farinacci@gmail.com>
Thread-Topic: [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
Thread-Index: AQHSFE0AGalANv3mDky1UF0kWTQPrqCEz7uA///BHPA=
Date: Wed, 21 Sep 2016 23:19:00 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com>
In-Reply-To: <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.97.1.147]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd02.lss.emc.com
X-RSA-Classifications: public
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/onPhqzFY-9rUslqkgj7zRyaNs9s>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "Black, David" <David.Black@dell.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-beta@external.cisco.com" <lisp-beta@external.cisco.com>
Subject: Re: [lisp] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Sep 2016 23:20:58 -0000
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From nobody Wed Sep 21 23:48:39 2016
Return-Path: <menth@uni-tuebingen.de>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 131B412B6A0; Wed, 21 Sep 2016 23:48:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.516
X-Spam-Level: 
X-Spam-Status: No, score=-6.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.316] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iFj68RcVuM8p; Wed, 21 Sep 2016 23:48:24 -0700 (PDT)
Received: from mx04.uni-tuebingen.de (mx04.uni-tuebingen.de [134.2.5.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52BC612B849; Wed, 21 Sep 2016 23:48:24 -0700 (PDT)
Received: from [192.168.1.100] (hsi-kbw-109-193-156-013.hsi7.kabel-badenwuerttemberg.de [109.193.156.13]) by mx04.uni-tuebingen.de (Postfix) with ESMTPSA id 5CDA9861BF; Thu, 22 Sep 2016 08:48:22 +0200 (CEST)
To: "Black, David" <David.Black@dell.com>, Dino Farinacci <farinacci@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com> <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
From: Michael Menth <menth@uni-tuebingen.de>
Message-ID: <57E37EC3.3010407@uni-tuebingen.de>
Date: Thu, 22 Sep 2016 08:48:35 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/YnfKaD-vfe2aujFait3v0J1z7oA>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-beta@external.cisco.com" <lisp-beta@external.cisco.com>
Subject: Re: [lisp] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2016 06:48:27 -0000

Hi David,


   5.  The mapping system must allow request access (for subscribers) to
       be open and public.  However, it is optional to provide
       confidentiality and authentication of the requesters and the
       information they are requesting.

> 
> (1) I don't see any confidentiality requirements.   

The optional requirement for confidentiality was added for potential use
cases where only some users are allowed to access information about
others. Motivation: snooping mapping system informatation may be a way
to track the behavior of other users.

Regards,

Michael

-- 
Prof. Dr. habil. Michael Menth
University of Tuebingen
Faculty of Science
Department of Computer Science
Chair of Communication Networks
Sand 13, 72076 Tuebingen, Germany
phone: (+49)-7071/29-70505
fax: (+49)-7071/29-5220
mailto:menth@uni-tuebingen.de
http://kn.inf.uni-tuebingen.de


From nobody Thu Sep 22 11:08:58 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E8CD12B5A9; Thu, 22 Sep 2016 11:08:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id umS0grvij324; Thu, 22 Sep 2016 11:08:51 -0700 (PDT)
Received: from mail-pf0-x233.google.com (mail-pf0-x233.google.com [IPv6:2607:f8b0:400e:c00::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A846E12B05A; Thu, 22 Sep 2016 11:08:51 -0700 (PDT)
Received: by mail-pf0-x233.google.com with SMTP id z123so33012144pfz.2; Thu, 22 Sep 2016 11:08:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DUH5fPBTyYQ4XR91X/cpbZInQmjy+mjvF2FvDRoh7nk=; b=QWAxjiMlYmM7c/0WllEN48xmV+qUOngpJMluHZMBZollACRyldvr14ctMkue5mswux fhLBofePp+AaF/fJuDd4grKGVZXYJ1A0A3IIxoPdf6EwvtXbG87okqbo1yE72mVZeTbl ZsNCSJYdH5hurL6w1s6nDdzVtLYK5crsu2ZbN6hb+ARkdFbqfzIo+nossfxuAXf9dmm3 k0z+mNmcd//UsfW2wnENprD83m9hjdpzT61oEhYz4zkc0cGNta8AEda9jt1Khe9mXZos gu5OsLWVlzbr4wuX4+nOGKHuabDLBaqJk72MykypePE+p5AY3k6Q9IE+q+2CHwMJ7tpV TCbg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DUH5fPBTyYQ4XR91X/cpbZInQmjy+mjvF2FvDRoh7nk=; b=SrTiNIWKiY6fDrIpAIvwYx4ZqLsNQVuZa2h47+y3xW1YdANCuZObwlKsRG3qPh9RZ0 Gf2EJkahMR2L1dXQRLMiDIQN1rcLG/ik72hUSl71YIMDIKliXmf+N9nSiWF6RlPdougb Q9k+nb2Br112jXRIGxkcLj48obczw1nDZqqbwa+W2a0Wumv1bepQBD0HMQsAHgD7XuYL 9WcvMpMGQpskKOHO5X9x0MJXLz/IMzX/1NfuvT3vjAUxdJHnbnx3fapwYx/1N/KTRIT+ jiFZsD8HU5GEUwYwAjYKFkCRWPA8eSzV7SutcvRcf6qVdLDv19FzHY1dhPFV7V2s8aDZ sPeA==
X-Gm-Message-State: AE9vXwOKkOclH3oGufx+BuGpPfOtmxh6jo0So2wkEktRM92vldUsbuztEViOKTFAVze2Hw==
X-Received: by 10.98.86.11 with SMTP id k11mr5360681pfb.182.1474567731287; Thu, 22 Sep 2016 11:08:51 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id an11sm5677355pac.26.2016.09.22.11.08.50 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 22 Sep 2016 11:08:50 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <57E37EC3.3010407@uni-tuebingen.de>
Date: Thu, 22 Sep 2016 11:08:50 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <F6496022-E2DA-4EFF-982F-6E73CD2EDD8E@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com> <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com> <57E37EC3.3010407@uni-tuebingen.de>
To: Michael Menth <menth@uni-tuebingen.de>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/oGmMkXJSD5A7aLQKw9KHlvrhD90>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "Black, David" <David.Black@dell.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-beta@external.cisco.com" <lisp-beta@external.cisco.com>
Subject: Re: [lisp] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2016 18:08:57 -0000

> The optional requirement for confidentiality was added for potential use
> cases where only some users are allowed to access information about
> others. Motivation: snooping mapping system informatation may be a way
> to track the behavior of other users.

Especially if GPS coordinates were part of the RLOC-records.

Dino


From nobody Thu Sep 22 22:17:22 2016
Return-Path: <padma.ietf@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 250EF12BDDE; Thu, 22 Sep 2016 22:17:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O6sZrDp68BY3; Thu, 22 Sep 2016 22:17:19 -0700 (PDT)
Received: from mail-qk0-x22e.google.com (mail-qk0-x22e.google.com [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4EC7012BD09; Thu, 22 Sep 2016 22:17:19 -0700 (PDT)
Received: by mail-qk0-x22e.google.com with SMTP id g67so36634195qkd.0; Thu, 22 Sep 2016 22:17:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3pCfiWIXhMMhZN45mfQ5eTQ8VmGehL2+S1OfjUOFgf4=; b=EKBMHtCGR/0BHlM8/9SwqzNuoZPLTDGY+wjk+VEBtC5c4iLgX9cuR0Mub2cNeOtRuW EuliE8Pn/uSfF/80uPztZNVQKikVZwwb+03qiBZpXf9vtUA7xZioovOTDzau7CxhreTZ SV/1FbGn0ao2Bo5U38Mt1nVOvwBKs7Xa5CfPoNKswzvaTvoulM3Dt76Rck7fR36k0lzH u+DTscMi7cAX7fxMaxqTdw9PdZoncJ/eH5Y4dwnD876V+FMIMckPpIU6UHKOlUY1XmNp NIYpkXqxCBnjYdyP6dSom6VJA3JlM0ZrDLHHO6aY5UJ23d8BtWwqxCCHLnmPLD8ejw8S rKLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3pCfiWIXhMMhZN45mfQ5eTQ8VmGehL2+S1OfjUOFgf4=; b=KT/XxhQ/UxYjBTeVoQu9bf1oxwaA0qWjMBD6UWq7xRp8xo2ZQqDb6x0qVYGBNBLux3 ymajTO/Q2J2gCxY0fdzwV/iYI41iPJUpzh9wXAiWYVwfhxMu8Qz6MqVcsdGwFlevdZWn 8QOFLVXG2WsYD/fcMREEjSqAp4deyLm8a4D3q01V1sxsD+zxdypKwSlj+q+su2CiHwiU tkRMF5ErfidMT0DGbCyLEHSm7CBRu+kFx2bZtBv8LvsucTsqfwJA00KhFAqUpIWOOKQI VfVYy+FIDkkDRVOFjKctSEpJUq7rhMrb+tyGe48qfMra0oqXGRf7XhAjSboQ7nDvT2uy WaRw==
X-Gm-Message-State: AA6/9Rm7cNXFY9I3Pyf5e0U8VkcNLkPP15lLz7vzzXHluz1k+Go6rDSrcvKSu63tNwc7+qGhZrQeJUI9bzcOqg==
X-Received: by 10.55.188.193 with SMTP id m184mr5752296qkf.129.1474607838520;  Thu, 22 Sep 2016 22:17:18 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.38.56 with HTTP; Thu, 22 Sep 2016 22:17:18 -0700 (PDT)
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com> <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
From: Padma Pillay-Esnault <padma.ietf@gmail.com>
Date: Thu, 22 Sep 2016 22:17:18 -0700
Message-ID: <CAG-CQxoxCphOpTAUJ54u7MmCM4BBGzFR6kSyQXvvJ7B5ZZXK2A@mail.gmail.com>
To: "Black, David" <David.Black@dell.com>
Content-Type: multipart/alternative; boundary=94eb2c0430a665f7d2053d25e4a3
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ZCHoMKtNNYvuuC0M8Gz_YQ0qA1Y>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-beta@external.cisco.com" <lisp-beta@external.cisco.com>
Subject: Re: [lisp] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Sep 2016 05:17:21 -0000

--94eb2c0430a665f7d2053d25e4a3
Content-Type: text/plain; charset=UTF-8

Hi David

Thanks for your comments.
I take note of your comment (2) and pointer.

Here is a pointer to the draft
 https://www.ietf.org/internet-drafts/draft-padma-ideas-probl
em-statement-00.txt

Padma



On Wed, Sep 21, 2016 at 4:19 PM, Black, David <David.Black@dell.com> wrote:

> Hi Dino,
>
> Here are a couple of areas to consider:
>
> (1) I don't see any confidentiality requirements.   For this and other
> NVO3 security
> requirements, please see the security considerations section of RFC 7365
> (NVO3
> framework) and draft-ietf-nvo3-arch.  The latter contains a new paragraph
> on
> sensitivity of performance and  other monitoring data gathered by the
> control
> plane - that paragraph was added at the behest of both Security ADs:
>
> https://tools.ietf.org/html/rfc7365#section-5
> https://tools.ietf.org/html/draft-ietf-nvo3-arch-08#section-16
>
> (2) This item:
>
> > >   7.  Message rate-limiting and other heuristics must be part of the
> > >       foundational support of the mapping system to protect the system
> > >       from invalid overloaded conditions.
>
> suggests that congestion control is also a consideration to protect the
> network.
> If an existing congestion-controlled transport protocol (e.g., TCP, SCTP,
> DCCP) is
> not used for control traffic, then see draft-ietf-tsvwg-rfc5405bis for
> discussion
> of applicable requirements:
>
> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc5405bis/
>
> Thanks, --David
>
>

--94eb2c0430a665f7d2053d25e4a3
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi David<div><br></div><div>Thanks for your comments.</div=
><div>I take note of your comment (2) and pointer.<br></div><div><br></div>=
<div>Here is a pointer to the draft</div><div><div><span style=3D"font-size=
:13px">=C2=A0</span><a href=3D"https://www.ietf.org/internet-drafts/draft-p=
adma-ideas-problem-statement-00.txt" rel=3D"noreferrer" target=3D"_blank" s=
tyle=3D"font-size:13px">https://www.ietf.org/internet-<wbr>drafts/draft-pad=
ma-ideas-probl<wbr>em-statement-00.txt</a></div><div><br></div><div>Padma</=
div><div><br></div><div><br></div><div class=3D"gmail_extra"><br><div class=
=3D"gmail_quote">On Wed, Sep 21, 2016 at 4:19 PM, Black, David <span dir=3D=
"ltr">&lt;<a href=3D"mailto:David.Black@dell.com" target=3D"_blank">David.B=
lack@dell.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb=
(204,204,204);border-left-style:solid;padding-left:1ex">Hi Dino,<br>
<br>
Here are a couple of areas to consider:<br>
<br>
(1) I don&#39;t see any confidentiality requirements.=C2=A0 =C2=A0For this =
and other NVO3 security<br>
requirements, please see the security considerations section of RFC 7365 (N=
VO3<br>
framework) and draft-ietf-nvo3-arch.=C2=A0 The latter contains a new paragr=
aph on<br>
sensitivity of performance and=C2=A0 other monitoring data gathered by the =
control<br>
plane - that paragraph was added at the behest of both Security ADs:<br>
<br>
<a href=3D"https://tools.ietf.org/html/rfc7365#section-5" rel=3D"noreferrer=
" target=3D"_blank">https://tools.ietf.org/html/<wbr>rfc7365#section-5</a><=
br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-nvo3-arch-08#section-16" =
rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft=
-ietf-nvo3-arch-08#<wbr>section-16</a><br>
<br>
(2) This item:<br>
<span class=3D"gmail-"><br>
&gt; &gt;=C2=A0 =C2=A07.=C2=A0 Message rate-limiting and other heuristics m=
ust be part of the<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0foundational support of the mapping sys=
tem to protect the system<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0from invalid overloaded conditions.<br>
<br>
</span>suggests that congestion control is also a consideration to protect =
the network.<br>
If an existing congestion-controlled transport protocol (e.g., TCP, SCTP, D=
CCP) is<br>
not used for control traffic, then see draft-ietf-tsvwg-rfc5405bis for disc=
ussion<br>
of applicable requirements:<br>
<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc5405bis/" r=
el=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/d=
raft-ietf-tsvwg-<wbr>rfc5405bis/</a><br>
<br>
Thanks, --David<br>
<div class=3D"gmail-HOEnZb"><div class=3D"gmail-h5"><br></div></div></block=
quote></div></div></div></div>

--94eb2c0430a665f7d2053d25e4a3--


From nobody Fri Sep 23 15:44:03 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB38612B892; Fri, 23 Sep 2016 15:43:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ior9jqhIxic; Fri, 23 Sep 2016 15:43:40 -0700 (PDT)
Received: from mail-pf0-x22e.google.com (mail-pf0-x22e.google.com [IPv6:2607:f8b0:400e:c00::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E23A12B7D8; Fri, 23 Sep 2016 15:43:40 -0700 (PDT)
Received: by mail-pf0-x22e.google.com with SMTP id s13so11760641pfd.2; Fri, 23 Sep 2016 15:43:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=zftCp6Uiazu3/OFDhNpRLcYA0dsmfWljpzlgE/QfJD4=; b=rs6dwK5RW2ONlGk/sPQXtsiWEIWBBoZMsES4z5LqIMImBqrzqnWXG1t1WAV0xeAOm/ CKpYzF88eFw9UK5wbApTgh4vYgUCgX9HkFy8uIRtcR+EoGM0Dk6HZ4vkAl8rMdDPF7J/ bRZA14yMTF+eb+w2hrKuEdw9v1QukKJCxT6HwlNrjjF5GZCDLVthuH4yLZuAUn3QBbpQ 5LrJ0qjqW8xZc5jXUXwNLZq+mOR4vvvdnzjfcBeJnftONvQvejk7tp4Px8resZOdHJXn GUPrvOlCZ7o3llThhGzOrYTE/4b3nqPyMH/n0pcK7IyiGa97d8lw++CvlihV9NxCQ1Os b4hA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=zftCp6Uiazu3/OFDhNpRLcYA0dsmfWljpzlgE/QfJD4=; b=NPN+DEU32wCdfCFx7QcAFbIDydwzdoYrjWlaOjgpKZShs1kouBCOhFBO0QZEVRNN7i NCDxrhiVBLyZQ4fnt07kDY5nO6fkXWOeOptpSzrd44qIozyKtuHZeRvBjOjHxLf2ERpe eT0pD0MoUdzDkQEIGH6A8/Nb546roGD88gDvaCPUjDEeAWe/zgLM2gJJp4r9v9jujsY4 kzahW/iyfAhq3pLC4ZXaANo6wjBrV71y0TjmYZRUQTog4FgiKEJO8SI3LaAA3LfBye8w 1PQhRlfQaVPPHb6tloJdOxvtEnrOy+qFJP1JYUMEWJDWae4KbpGTrNCdhgdMMSOXy92S tIWA==
X-Gm-Message-State: AE9vXwPiiTE4FglR2WQUweMwERAT6F1W807txytIvK8Nt0NB6hTYUOgAVrEQFK8oW0x2mg==
X-Received: by 10.98.196.206 with SMTP id h75mr16554543pfk.156.1474670619940;  Fri, 23 Sep 2016 15:43:39 -0700 (PDT)
Received: from ?IPv6:2601:646:8d01:89f0:9852:e79f:5f4e:878c? ([2601:646:8d01:89f0:9852:e79f:5f4e:878c]) by smtp.gmail.com with ESMTPSA id tn5sm13866312pac.6.2016.09.23.15.43.38 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 23 Sep 2016 15:43:39 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
Date: Fri, 23 Sep 2016 15:43:38 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <878F281A-F391-4BED-988D-7CF6A7F6AA91@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <8CC1E61E-0A8F-41D3-B30D-5B037BAEDEB1@gmail.com> <CE03DB3D7B45C245BCA0D243277949362F69ED1C@MX307CL04.corp.emc.com>
To: "Black, David" <David.Black@dell.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/yq4qkHWVvwsVenSjDggltr3T3VA>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-beta@external.cisco.com" <lisp-beta@external.cisco.com>
Subject: Re: [lisp] [nvo3] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Sep 2016 22:43:44 -0000

> Hi Dino,

Thanks so much David for the reply. The pointers you provided will be =
useful.

> Here are a couple of areas to consider:
>=20
> (1) I don't see any confidentiality requirements.   For this and other =
NVO3 security
> requirements, please see the security considerations section of RFC =
7365 (NVO3

I can see this for east-west traffic patterns. Assuming the mapping =
database would be managed internal to a data center where there would =
not be regisrations from any VTEPs/xTRs outside of the data center.

But what if there was an overlay among CPE routers, access-points, and =
top-of-rack data center switches. Then the registration and requesting =
of mappings may travel outside of a secured physical area. Any reaction =
to this?

> framework) and draft-ietf-nvo3-arch.  The latter contains a new =
paragraph on
> sensitivity of performance and  other monitoring data gathered by the =
control
> plane - that paragraph was added at the behest of both Security ADs:
>=20
> https://tools.ietf.org/html/rfc7365#section-5

For multi-tenancy, there can be an instance of a mapping system that =
runs for each tennant or a single mapping system run by the =
multi-tennant provider. In any case, encrypting Map-Registers and =
Map-Requests COULD be desirable. Not sure. Again, this requirement we =
have stated would be for private mapping systems and not a global =
mapping system that would be a public service much like DNS is.

> https://tools.ietf.org/html/draft-ietf-nvo3-arch-08#section-16

Since the draft-padma-ideas-problem-statement-00.txt is focusing on =
control-plane, there would be no mention of data-plane security but =
there are mechanisms for doing this.

For the control-plane reference in section 16, there is plans to have =
authentication and it could also be done with AE (Authenticated =
Encryption) mechanisms.

>=20
> (2) This item:
>=20
>>>  7.  Message rate-limiting and other heuristics must be part of the
>>>      foundational support of the mapping system to protect the =
system
>>>      from invalid overloaded conditions.
>=20
> suggests that congestion control is also a consideration to protect =
the network.

Yes.

> If an existing congestion-controlled transport protocol (e.g., TCP, =
SCTP, DCCP) is
> not used for control traffic, then see draft-ietf-tsvwg-rfc5405bis for =
discussion
> of applicable requirements:

We were thinking not just high-rate due to speed mismatches but more =
importantly DoS attacks from rogue sources.

Thanks again,
Dino

> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc5405bis/
>=20
> Thanks, --David
>=20
>> -----Original Message-----
>> From: nvo3 [mailto:nvo3-bounces@ietf.org] On Behalf Of Dino Farinacci
>> Sent: Wednesday, September 21, 2016 6:51 PM
>> To: Dino Farinacci
>> Cc: beta@lispers.net; ideas@ietf.org; LISP mailing list list; NVO3; =
LISPmob;
>> 5gangip@ietf.org; lisp-beta@external.cisco.com
>> Subject: Re: [nvo3] Mapping System Requirements and =
draft-padma-ideas-
>> problem-statement-00.txt
>>=20
>> Reposting since the cisco mailing lists are no longer in service. =
Please respond to
>> this email.
>>=20
>> Thanks and sorry for inconvenience,
>> Dino
>>=20
>>> On Sep 21, 2016, at 2:12 PM, Dino Farinacci <farinacci@gmail.com> =
wrote:
>>>=20
>>> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have =
a section
>> on mapping system requirements for map-n-encap and translation based =
loc/id
>> split protocols. Rather than having you go into the document in =
detail (we wish
>> you would and comment though), I will provide the short list below to =
attempt a
>> discussion on requirements.
>>>=20
>>> I have copied the possible WGs that may want to use the mapping =
system
>> technology. And I have also copied the LISP working group who can =
shed
>> expertise on the subject as well as some beta lists that have some =
operational
>> experiences with mapping database deployment and management.
>>>=20
>>> The requirements below have a security and robustness twist to it =
but I think
>> that is the best place to start and to consider security =E2=80=9Cup =
front=E2=80=9D.
>>>=20
>>> Thanks in advance,
>>> Dino
>>>=20
>>> ----
>>>=20
>>> 6.4.  Mapping System Security
>>>=20
>>>  The secure mapping system must have the following requirements:
>>>=20
>>>  1.  The components of the mapping system need to be robust against
>>>      direct and indirect attacks.  If any component is attacked, the
>>>      rest of the system should act with integrity and scale and only
>>>      the information associated with the compromised component is =
made
>>>      unavailable.
>>>=20
>>>  2.  The addition and removal of components of the mapping system =
must
>>>      be performed in a secure matter so as to not violate the
>>>      integrity and operation of the system and service it provides.
>>>=20
>>>  3.  The information returned by components of the mapping system
>>>      needs to be authenticated as to detect spoofing from
>>>      masqueraders.
>>>=20
>>>  4.  Information registered (by publishers) to the mapping system =
must
>>>      be authenticated so the registering entity or the information =
is
>>>      not spoofed.
>>>=20
>>>  5.  The mapping system must allow request access (for subscribers) =
to
>>>      be open and public.  However, it is optional to provide
>>>      confidentiality and authentication of the requesters and the
>>>      information they are requesting.
>>>=20
>>>  6.  Any information provided by components of the mapping system =
must
>>>      be cryptographically signed by the provider and verified by the
>>>      consumer.
>>>=20
>>>  7.  Message rate-limiting and other heuristics must be part of the
>>>      foundational support of the mapping system to protect the =
system
>>>      from invalid overloaded conditions.
>>>=20
>>>  8.  The mapping system should support some form of provisioned
>>>      policy.  Either internal to the system or via mechanisms for
>>>      users of the system to describe policy rules.  Access control
>>>      should not use traditional granular-based access lists since =
they
>>>      do not scale and are hard to manage.  By the use of token- or
>>>      key- based authentication methods as well as deploying multiple
>>>      instances of the mapping system will allow acceptable policy
>>>      profiles.  Machine learning techniques could automate these
>>>      mechanisms.
>>=20
>> _______________________________________________
>> nvo3 mailing list
>> nvo3@ietf.org
>> https://www.ietf.org/mailman/listinfo/nvo3


From nobody Tue Sep 27 16:06:15 2016
Return-Path: <Lin.Han@huawei.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 870A112B020; Tue, 27 Sep 2016 16:06:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.537
X-Spam-Level: 
X-Spam-Status: No, score=-6.537 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id exQQzD-dqZXJ; Tue, 27 Sep 2016 16:06:11 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB4A012B4F9; Tue, 27 Sep 2016 16:06:07 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CXA32643; Tue, 27 Sep 2016 23:06:05 +0000 (GMT)
Received: from SJCEML703-CHM.china.huawei.com (10.218.25.36) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 28 Sep 2016 00:06:04 +0100
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.53]) by SJCEML703-CHM.china.huawei.com ([169.254.5.29]) with mapi id 14.03.0235.001; Tue, 27 Sep 2016 16:06:00 -0700
From: Lin Han <Lin.Han@huawei.com>
To: "'Dino Farinacci'" <farinacci@gmail.com>, "ideas@ietf.org" <ideas@ietf.org>
Thread-Topic: [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
Thread-Index: AQHSFEz/FaqdWIqsa0+j3Mkt86zi8qCN9f8Q
Date: Tue, 27 Sep 2016 23:06:00 +0000
Message-ID: <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com>
In-Reply-To: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.64.181]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.57EAFB5E.0040, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.53, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 8135e4efe298bfe4a17529450d290015
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/gduv1keUr12TovkzitM3cElb2wo>
Cc: "beta@lispers.net" <beta@lispers.net>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Sep 2016 23:06:13 -0000
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From nobody Tue Sep 27 16:13:46 2016
Return-Path: <rraszuk@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7408312B01C; Tue, 27 Sep 2016 16:13:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level: 
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vOcFdi_gjhtT; Tue, 27 Sep 2016 16:13:41 -0700 (PDT)
Received: from mail-wm0-x22d.google.com (mail-wm0-x22d.google.com [IPv6:2a00:1450:400c:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4631C12B4B8; Tue, 27 Sep 2016 16:13:40 -0700 (PDT)
Received: by mail-wm0-x22d.google.com with SMTP id w84so203746583wmg.1; Tue, 27 Sep 2016 16:13:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=hBSFtnUIhGUP9WTkjlpdJkyBLr9e2J+9GL28hSfp5rE=; b=HSmbR6+4guyvoZdW2KB9E///b0Gd8aTVgZ0ar3DKk4Dg7y3WjioRjnrBIkb84Ckuh8 sXvL9CQsCAxbfiFVopzFuAjbtt1drH8IdtadDL0FQBs9cJES4Y3mgN+Vq8n++rVrtYtc wJLqRRxqZuOlAEPjRoSi3jOJ8hVD+7PKUn0m4gggWbTETA5Fb7tibmYmXqtFfx/pn0/q 6OsdnOEDcslxiNLkJt7VaJ5gjRVQ5JlNIhLF0FUFtHKi4DaJ4Am32sfbovaVqbcIJyKH +79vqKHv4I1SjSPxQkbPcY6mc00lWsOq40ZJRol1atmjJSh1Wl88yNYCXBlZ2yQT5HXn HMTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=hBSFtnUIhGUP9WTkjlpdJkyBLr9e2J+9GL28hSfp5rE=; b=TNM31pLCTyHUmLjcEA34Bl89WjrL8lQxiun7j2BigYz9N7nU7yZpAy4OyZvcnmkIQb S8cSfwrJmBj5JEotzakgylT9BmiY3Md4d7WJg4AOD+yymb3D6hsbL/CKIsZvujgvpZEh WJDCDYtxkbur0x02n2eH4po1rTNkyoA6cUs7Cn8jH+GLQomST54Nd1E4r+X6ap5oteaH V/Q7PPqc0nOfLWBMT/4C3fPkvEZ6eI06bLw4sOb77KLOFV4MG/OcKJT5qRWaAaO/+Tgp zL6/1zBtZl+4z9BCZF9E4Nd6xlyLUfoHeK/gM/QSjreBhn6zQTTfwjmsokDEmEAtRR0R /7sg==
X-Gm-Message-State: AA6/9Rkj4EYBdV3QVGPyEaezpSFKHaYdv0VIXe5x6uH8ba1s6CLkjaqCxZEj7Xzpj09aqXlBE9u5hsWN5aSksA==
X-Received: by 10.28.35.68 with SMTP id j65mr4814453wmj.61.1475018018739; Tue, 27 Sep 2016 16:13:38 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 10.80.153.44 with HTTP; Tue, 27 Sep 2016 16:13:37 -0700 (PDT)
In-Reply-To: <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Wed, 28 Sep 2016 01:13:37 +0200
X-Google-Sender-Auth: tJ4zCPyuB-cB0v7XVEaFOi-TvGc
Message-ID: <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com>
To: Lin Han <Lin.Han@huawei.com>
Content-Type: multipart/alternative; boundary=001a113e9a340b5db2053d856545
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/Rk4P5nCkNuYCPamlj45dbvBYhNw>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Sep 2016 23:13:44 -0000

--001a113e9a340b5db2053d856545
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Dear Lin,

You bring interesting news to the table with your insight ...

IMHO any global mapping plane should be fully distributed with no root
under any specific gov.

Look at BGP protocol ... it does not require a root .. yet it allows to
dynamically interconnect quite a few of global databases. Of course from 30
years back we now know much more modern ways to share information then via
distance vector protocol. But none of those should be based on any politics
controlling "the root" of it no matter which side it is on.

/* Side comment .... */

When I spoke to some of the 5G folks this was clearly the direction and in
fact Dino's LISP was one of the strongest candidates there as control
plane.

Best,
Robert.

On Wed, Sep 28, 2016 at 1:06 AM, Lin Han <Lin.Han@huawei.com> wrote:

> Hi, Dino
>
> Should we consider the security of sovereignty for the mapping system?
> This question is probably too early.
>
> As you know, DNS tree architecture introduced a lot debate historically
> for the ownership and operation of root DNS. Due to pressure from industr=
y
> and other countries, USA government plans to hand over the operation of
> root DNS to IANA next month even there is a lot opposing voice from
> congress. It could change back again.
>
> One side is that the national security of US prefer the government
> operates the root DNS, another side is that other countries don=E2=80=99t=
 like US
> to completely control the DNS.
>
> This is related to both technology and politics. Without the support of
> other countries, mapping server deployment globally will be in question.
>
>
> Regards
>
> Lin
>
>
>
> -----Original Message-----
> From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Dino Farinacci
> Sent: Wednesday, September 21, 2016 2:13 PM
> To: ideas@ietf.org
> Cc: beta@lispers.net; LISP mailing list list; NVO3;
> lisp-alpha@external.cisco.com; LISPmob; 5gangip@ietf.org;
> lisp-ops@external.cisco.com
> Subject: [Ideas] Mapping System Requirements and draft-padma-ideas-proble=
m-
> statement-00.txt
>
> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a
> section on mapping system requirements for map-n-encap and translation
> based loc/id split protocols. Rather than having you go into the document
> in detail (we wish you would and comment though), I will provide the shor=
t
> list below to attempt a discussion on requirements.
>
> I have copied the possible WGs that may want to use the mapping system
> technology. And I have also copied the LISP working group who can shed
> expertise on the subject as well as some beta lists that have some
> operational experiences with mapping database deployment and management.
>
> The requirements below have a security and robustness twist to it but I
> think that is the best place to start and to consider security =E2=80=9Cu=
p front=E2=80=9D.
>
> Thanks in advance,
> Dino
>
> ----
>
> 6.4.  Mapping System Security
>
>    The secure mapping system must have the following requirements:
>
>    1.  The components of the mapping system need to be robust against
>        direct and indirect attacks.  If any component is attacked, the
>        rest of the system should act with integrity and scale and only
>        the information associated with the compromised component is made
>        unavailable.
>
>    2.  The addition and removal of components of the mapping system must
>        be performed in a secure matter so as to not violate the
>        integrity and operation of the system and service it provides.
>
>    3.  The information returned by components of the mapping system
>        needs to be authenticated as to detect spoofing from
>        masqueraders.
>
>    4.  Information registered (by publishers) to the mapping system must
>        be authenticated so the registering entity or the information is
>        not spoofed.
>
>    5.  The mapping system must allow request access (for subscribers) to
>        be open and public.  However, it is optional to provide
>        confidentiality and authentication of the requesters and the
>        information they are requesting.
>
>    6.  Any information provided by components of the mapping system must
>        be cryptographically signed by the provider and verified by the
>        consumer.
>
>    7.  Message rate-limiting and other heuristics must be part of the
>        foundational support of the mapping system to protect the system
>        from invalid overloaded conditions.
>
>    8.  The mapping system should support some form of provisioned
>        policy.  Either internal to the system or via mechanisms for
>        users of the system to describe policy rules.  Access control
>        should not use traditional granular-based access lists since they
>        do not scale and are hard to manage.  By the use of token- or
>        key- based authentication methods as well as deploying multiple
>        instances of the mapping system will allow acceptable policy
>        profiles.  Machine learning techniques could automate these
>        mechanisms.
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas
>

--001a113e9a340b5db2053d856545
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:arial,he=
lvetica,sans-serif;font-size:small">Dear Lin,</div><div class=3D"gmail_defa=
ult" style=3D"font-family:arial,helvetica,sans-serif;font-size:small"><br><=
/div><div class=3D"gmail_default" style=3D"font-family:arial,helvetica,sans=
-serif;font-size:small">You bring interesting news to the table with your i=
nsight ...</div><div class=3D"gmail_default" style=3D"font-family:arial,hel=
vetica,sans-serif;font-size:small"><br></div><div class=3D"gmail_default" s=
tyle=3D"font-family:arial,helvetica,sans-serif;font-size:small">IMHO any gl=
obal mapping plane should be fully distributed with no root under any speci=
fic gov.=C2=A0</div><div class=3D"gmail_default" style=3D"font-family:arial=
,helvetica,sans-serif;font-size:small"><br></div><div class=3D"gmail_defaul=
t" style=3D"font-family:arial,helvetica,sans-serif;font-size:small">Look at=
 BGP protocol ... it does not require a root .. yet it allows to dynamicall=
y interconnect quite a few of global databases. Of course from 30 years bac=
k we now know much more modern ways to share information then via distance =
vector protocol. But none of those should be based on any politics controll=
ing &quot;the root&quot; of it no matter which side it is on.=C2=A0</div><d=
iv class=3D"gmail_default" style=3D"font-family:arial,helvetica,sans-serif;=
font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-famil=
y:arial,helvetica,sans-serif;font-size:small">/* Side comment .... */</div>=
<div class=3D"gmail_default" style=3D"font-family:arial,helvetica,sans-seri=
f;font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-fam=
ily:arial,helvetica,sans-serif;font-size:small">When I spoke to some of the=
 5G folks this was clearly the direction and in fact Dino&#39;s LISP was on=
e of the strongest candidates there as control plane.=C2=A0</div><div class=
=3D"gmail_default" style=3D"font-family:arial,helvetica,sans-serif;font-siz=
e:small"><br></div><div class=3D"gmail_default" style=3D"font-family:arial,=
helvetica,sans-serif;font-size:small">Best,</div><div class=3D"gmail_defaul=
t" style=3D"font-family:arial,helvetica,sans-serif;font-size:small">Robert.=
</div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On We=
d, Sep 28, 2016 at 1:06 AM, Lin Han <span dir=3D"ltr">&lt;<a href=3D"mailto=
:Lin.Han@huawei.com" target=3D"_blank">Lin.Han@huawei.com</a>&gt;</span> wr=
ote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex">Hi, Dino<br>
<br>
Should we consider the security of sovereignty for the mapping system? This=
 question is probably too early.<br>
<br>
As you know, DNS tree architecture introduced a lot debate historically for=
 the ownership and operation of root DNS. Due to pressure from industry and=
 other countries, USA government plans to hand over the operation of root D=
NS to IANA next month even there is a lot opposing voice from congress. It =
could change back again.<br>
<br>
One side is that the national security of US prefer the government operates=
 the root DNS, another side is that other countries don=E2=80=99t like US t=
o completely control the DNS.<br>
<br>
This is related to both technology and politics. Without the support of oth=
er countries, mapping server deployment globally will be in question.<br>
<br>
<br>
Regards<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
Lin<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
<br>
-----Original Message-----<br>
From: Ideas [mailto:<a href=3D"mailto:ideas-bounces@ietf.org">ideas-bounces=
@ietf.org</a><wbr>] On Behalf Of Dino Farinacci<br>
Sent: Wednesday, September 21, 2016 2:13 PM<br>
To: <a href=3D"mailto:ideas@ietf.org">ideas@ietf.org</a><br>
Cc: <a href=3D"mailto:beta@lispers.net">beta@lispers.net</a>; LISP mailing =
list list; NVO3; <a href=3D"mailto:lisp-alpha@external.cisco.com">lisp-alph=
a@external.cisco.com</a>; LISPmob; <a href=3D"mailto:5gangip@ietf.org">5gan=
gip@ietf.org</a>; <a href=3D"mailto:lisp-ops@external.cisco.com">lisp-ops@e=
xternal.cisco.com</a><br>
Subject: [Ideas] Mapping System Requirements and draft-padma-ideas-problem-=
<wbr>statement-00.txt<br>
<br>
Hello folks. In draft-padma-ideas-problem-<wbr>statement-00.txt, we have a =
section on mapping system requirements for map-n-encap and translation base=
d loc/id split protocols. Rather than having you go into the document in de=
tail (we wish you would and comment though), I will provide the short list =
below to attempt a discussion on requirements.<br>
<br>
I have copied the possible WGs that may want to use the mapping system tech=
nology. And I have also copied the LISP working group who can shed expertis=
e on the subject as well as some beta lists that have some operational expe=
riences with mapping database deployment and management.<br>
<br>
The requirements below have a security and robustness twist to it but I thi=
nk that is the best place to start and to consider security =E2=80=9Cup fro=
nt=E2=80=9D.<br>
<br>
Thanks in advance,<br>
Dino<br>
<br>
----<br>
<br>
6.4.=C2=A0 Mapping System Security<br>
<br>
=C2=A0 =C2=A0The secure mapping system must have the following requirements=
:<br>
<br>
=C2=A0 =C2=A01.=C2=A0 The components of the mapping system need to be robus=
t against<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0direct and indirect attacks.=C2=A0 If any compon=
ent is attacked, the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0rest of the system should act with integrity and=
 scale and only<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0the information associated with the compromised =
component is made<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0unavailable.<br>
<br>
=C2=A0 =C2=A02.=C2=A0 The addition and removal of components of the mapping=
 system must<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0be performed in a secure matter so as to not vio=
late the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0integrity and operation of the system and servic=
e it provides.<br>
<br>
=C2=A0 =C2=A03.=C2=A0 The information returned by components of the mapping=
 system<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0needs to be authenticated as to detect spoofing =
from<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0masqueraders.<br>
<br>
=C2=A0 =C2=A04.=C2=A0 Information registered (by publishers) to the mapping=
 system must<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0be authenticated so the registering entity or th=
e information is<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0not spoofed.<br>
<br>
=C2=A0 =C2=A05.=C2=A0 The mapping system must allow request access (for sub=
scribers) to<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0be open and public.=C2=A0 However, it is optiona=
l to provide<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0confidentiality and authentication of the reques=
ters and the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0information they are requesting.<br>
<br>
=C2=A0 =C2=A06.=C2=A0 Any information provided by components of the mapping=
 system must<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0be cryptographically signed by the provider and =
verified by the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0consumer.<br>
<br>
=C2=A0 =C2=A07.=C2=A0 Message rate-limiting and other heuristics must be pa=
rt of the<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0foundational support of the mapping system to pr=
otect the system<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0from invalid overloaded conditions.<br>
<br>
=C2=A0 =C2=A08.=C2=A0 The mapping system should support some form of provis=
ioned<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0policy.=C2=A0 Either internal to the system or v=
ia mechanisms for<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0users of the system to describe policy rules.=C2=
=A0 Access control<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0should not use traditional granular-based access=
 lists since they<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0do not scale and are hard to manage.=C2=A0 By th=
e use of token- or<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0key- based authentication methods as well as dep=
loying multiple<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0instances of the mapping system will allow accep=
table policy<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0profiles.=C2=A0 Machine learning techniques coul=
d automate these<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0mechanisms.<br>
______________________________<wbr>_________________<br>
</div></div><div class=3D"HOEnZb"><div class=3D"h5">Ideas mailing list<br>
<a href=3D"mailto:Ideas@ietf.org">Ideas@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/ideas" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/ideas</a><br>
</div></div></blockquote></div><br></div>

--001a113e9a340b5db2053d856545--


From nobody Tue Sep 27 18:30:21 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 878F512B3A9; Tue, 27 Sep 2016 18:30:19 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.34.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147502621954.11800.14680609428119507023.idtracker@ietfa.amsl.com>
Date: Tue, 27 Sep 2016 18:30:19 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/46bY3m-7J7CZ3sgcZ_NS7oGivPA>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-crypto-08.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 01:30:19 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Data-Plane Confidentiality
        Authors         : Dino Farinacci
                          Brian Weis
	Filename        : draft-ietf-lisp-crypto-08.txt
	Pages           : 19
	Date            : 2016-09-27

Abstract:
   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-crypto-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-crypto-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Sep 27 19:59:48 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96FEB12B053; Tue, 27 Sep 2016 19:59:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id onmDfOvoirff; Tue, 27 Sep 2016 19:59:36 -0700 (PDT)
Received: from mail-pf0-x22b.google.com (mail-pf0-x22b.google.com [IPv6:2607:f8b0:400e:c00::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF2B512B054; Tue, 27 Sep 2016 19:59:36 -0700 (PDT)
Received: by mail-pf0-x22b.google.com with SMTP id 21so12209064pfy.0; Tue, 27 Sep 2016 19:59:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=b8Zbk1LCFBQK4WSeT1qeUukByWQZ7nEbJWc05JaW7Rs=; b=e5PBbxeweyBS+pKe+Up+mxgP0WRqi6F/x9Z6/seAMmmHvouUM/tzgIdzv4WTarFN4D UAjlLt7U0FGHV4WzyrnvSc5R26ReYi1zKLELq0TRxGtU0rtI3Vtepx+38LddHNkgV1X+ jqC5nei0wlefRDD+ZIdLkIa9nTKTd2IIcQOuU2YgTQrGsYoj4ffCxbzgK547nCNuK2dU c4AyKpK1srRv3ZVvZa2xVQ2P3bxe2WEIbbd34OPXGCqw1LM8snXWKu1GttRXlMIcty9+ siIoqfrnIrEPjM0zEb3BXLYAsy0qDlBIAudiIhE1WwFLPl8iJS2KXgG92wXRJln/+WV1 62SA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=b8Zbk1LCFBQK4WSeT1qeUukByWQZ7nEbJWc05JaW7Rs=; b=THLo156yqwlt+0jc4HwO5O97HAazc1XZxmdW65GtgV4hhBe0zcgrQuNdcBRHXtuYU3 CMRddl7TNbSGmWsg05WyemeAdGfizJ3VJcU7BR8sNGcwQ1SV3Qa0bld5IJ9+H5m23R6S cKWs0ArLLFMQaA8M7xiUKEXT1rD1A5tcL6RD9i+uF4Ab7PpTmM/+FTFLNRvQa5Y4oxES 6nRR2yO738QekpNwoy4ftwZtMOp5r1jL/n3RICqSHRttEkEndYueQu0AMlDLzRudVhCQ KNQv7/CCThUCS+WOQLYMcp9KyYjkddcWESS5LCfX2J483S3HyaqTzwGeu2rrnCTQXart 8nSA==
X-Gm-Message-State: AE9vXwMgEGGQ7pyX2OyoynKcH85jVZjCx14qmxj2rzfCWyNgRkvGNThHOXxCTAZZpr2H3Q==
X-Received: by 10.98.85.198 with SMTP id j189mr52960356pfb.123.1475031576299;  Tue, 27 Sep 2016 19:59:36 -0700 (PDT)
Received: from dino-macbook.wp.comcast.net (173-8-188-29-SFBA.hfc.comcastbusiness.net. [173.8.188.29]) by smtp.gmail.com with ESMTPSA id c28sm7867415pfj.6.2016.09.27.19.59.34 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Sep 2016 19:59:35 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com>
Date: Tue, 27 Sep 2016 19:59:33 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <ADE71A46-ABEC-4043-B740-6FEF3ACBE035@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com>
To: Lin Han <Lin.Han@huawei.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/HohBWtPr0zLDkljNFzWxPVotrBs>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 02:59:39 -0000

> Hi, Dino
>=20
> Should we consider the security of sovereignty for the mapping system? =
This question is probably too early.=20

Yes, you bring up a very real question that needs to be answered this =
early.

> As you know, DNS tree architecture introduced a lot debate =
historically for the ownership and operation of root DNS. Due to =
pressure from industry and other countries, USA government plans to hand =
over the operation of root DNS to IANA next month even there is a lot =
opposing voice from congress. It could change back again.

Architecturally we need root nodes as a mechanism but they do not have =
to be run by any one party or spread across government/continental =
boundaries.

Any root could be run independently and point to the same next level =
children leading to map-servers.

> One side is that the national security of US prefer the government =
operates the root DNS, another side is that other countries don=E2=80=99t =
like US to completely control the DNS.

I see this hierarchy run by commercial companies that have monetary =
incentive to run a production level service. So for example, I could use =
a pair of roots from say a Verisign. Or a different pair of roots =
offered by an AT&T, or a possible a third-party that calls themselves a =
Mapping Service Provider (MSP).

It is these roots at the top of the tree that need to connect to common =
parts in the middle and to the leaf map-servers of the tree.

> This is related to both technology and politics. Without the support =
of other countries, mapping server deployment globally will be in =
question.

If registrations and requests are encrypted, then anyone could run the =
roots and the what goes in and out of the mapping system stays private. =
But there needs to be competition so the level of service stays at a =
high-quality production level.

Dino

>=20
>=20
> Regards
>=20
> Lin
>=20
>=20
>=20
> -----Original Message-----
> From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Dino =
Farinacci
> Sent: Wednesday, September 21, 2016 2:13 PM
> To: ideas@ietf.org
> Cc: beta@lispers.net; LISP mailing list list; NVO3; =
lisp-alpha@external.cisco.com; LISPmob; 5gangip@ietf.org; =
lisp-ops@external.cisco.com
> Subject: [Ideas] Mapping System Requirements and =
draft-padma-ideas-problem-statement-00.txt
>=20
> Hello folks. In draft-padma-ideas-problem-statement-00.txt, we have a =
section on mapping system requirements for map-n-encap and translation =
based loc/id split protocols. Rather than having you go into the =
document in detail (we wish you would and comment though), I will =
provide the short list below to attempt a discussion on requirements.=20
>=20
> I have copied the possible WGs that may want to use the mapping system =
technology. And I have also copied the LISP working group who can shed =
expertise on the subject as well as some beta lists that have some =
operational experiences with mapping database deployment and management.
>=20
> The requirements below have a security and robustness twist to it but =
I think that is the best place to start and to consider security =E2=80=9C=
up front=E2=80=9D.
>=20
> Thanks in advance,
> Dino
>=20
> ----
>=20
> 6.4.  Mapping System Security
>=20
>   The secure mapping system must have the following requirements:
>=20
>   1.  The components of the mapping system need to be robust against
>       direct and indirect attacks.  If any component is attacked, the
>       rest of the system should act with integrity and scale and only
>       the information associated with the compromised component is =
made
>       unavailable.
>=20
>   2.  The addition and removal of components of the mapping system =
must
>       be performed in a secure matter so as to not violate the
>       integrity and operation of the system and service it provides.
>=20
>   3.  The information returned by components of the mapping system
>       needs to be authenticated as to detect spoofing from
>       masqueraders.
>=20
>   4.  Information registered (by publishers) to the mapping system =
must
>       be authenticated so the registering entity or the information is
>       not spoofed.
>=20
>   5.  The mapping system must allow request access (for subscribers) =
to
>       be open and public.  However, it is optional to provide
>       confidentiality and authentication of the requesters and the
>       information they are requesting.
>=20
>   6.  Any information provided by components of the mapping system =
must
>       be cryptographically signed by the provider and verified by the
>       consumer.
>=20
>   7.  Message rate-limiting and other heuristics must be part of the
>       foundational support of the mapping system to protect the system
>       from invalid overloaded conditions.
>=20
>   8.  The mapping system should support some form of provisioned
>       policy.  Either internal to the system or via mechanisms for
>       users of the system to describe policy rules.  Access control
>       should not use traditional granular-based access lists since =
they
>       do not scale and are hard to manage.  By the use of token- or
>       key- based authentication methods as well as deploying multiple
>       instances of the mapping system will allow acceptable policy
>       profiles.  Machine learning techniques could automate these
>       mechanisms.
> _______________________________________________
> Ideas mailing list
> Ideas@ietf.org
> https://www.ietf.org/mailman/listinfo/ideas


From nobody Tue Sep 27 20:02:13 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D960412B05E; Tue, 27 Sep 2016 20:02:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ewgZ2KpgTu2y; Tue, 27 Sep 2016 20:02:06 -0700 (PDT)
Received: from mail-pf0-x232.google.com (mail-pf0-x232.google.com [IPv6:2607:f8b0:400e:c00::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58E6B12B053; Tue, 27 Sep 2016 20:02:06 -0700 (PDT)
Received: by mail-pf0-x232.google.com with SMTP id 21so12231303pfy.0; Tue, 27 Sep 2016 20:02:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=kYrngZfsNzFsGKRvVF05rILMFZbC0Wdkj9xwEZy3P5E=; b=Glr5J+5w/zzqb1YIwzrlMDCdPXzqZjP2g1dBRqgIy3KM0no3uS5HGim8J9ociAcGeP +FBRhlMw8/C7akYagfT+Nb8W3LJLToTzA62MLTB15RwG3w/2q0tAa4a61Cu7wKKqMIdt C8iW8PSZPiCAvVmSUA+q4YmvSQcndWJpBPTwkUEAFgtjCKT4Kwmp8aFsMnzONj0Gyaa8 rbMVSAsql9etZi5xsoMiepk7Dj+LhX2UpTdlKqBMiWQoskwY9LdFsfOPVmXsmIpfum3S ZfOCm5zociGw28BqHUnNnFojhqCq5AMv76y9DIVFTUFGfs5rUp2vuNJ2zLECx6SxGS0Z 2uSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=kYrngZfsNzFsGKRvVF05rILMFZbC0Wdkj9xwEZy3P5E=; b=jldL9PP8uFE8UQSsWp1bsJU9v5I7wN09RizEkPDhG9CnPgjdRa85uG2W8kQ8gbnSu1 lwC0/daTQP/JHcFd9jUtDwrukuQCK2grtiCezDq+wZmiOmfCBB/TCp7c3GU9bl2zrk+6 yv9OxO5D6UnpU1JfRPtcV7F9w6EWMkVBX/nE7CMexvSQnYqEAfIB6dOwJ9G2KlmhTT3N gp/RUKk73VyDzpEXFPoYlD0WKeGXLTQbYqHj1dXYxgmbJVHmE85rZHM/kKWAxeFZQmv6 XGjuEVQ9mWtxCrF2iiG0qQLMCHm2V5fVxwF/u7cjNQgGQlvlnKijYcIMlH/ZQpFpn7V6 21rQ==
X-Gm-Message-State: AE9vXwNcMcPqoMIlWWdG7AsXKKEIm/fV3oNCzhOAvYrDGOIz3luAk/5n6COZqNNFJTAD4Q==
X-Received: by 10.98.14.221 with SMTP id 90mr52819896pfo.181.1475031725849; Tue, 27 Sep 2016 20:02:05 -0700 (PDT)
Received: from dino-macbook.wp.comcast.net (173-8-188-29-SFBA.hfc.comcastbusiness.net. [173.8.188.29]) by smtp.gmail.com with ESMTPSA id h8sm7830745pfk.88.2016.09.27.20.02.04 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Sep 2016 20:02:05 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com>
Date: Tue, 27 Sep 2016 20:02:03 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <8CA89FA5-D1AC-4D3B-8CB4-FD5E16DE8C4F@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com>
To: Robert Raszuk <robert@raszuk.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/2HNQd3dfz-3sZL0dvsE4dMx9Pug>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>, Lin Han <Lin.Han@huawei.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 03:02:08 -0000

> When I spoke to some of the 5G folks this was clearly the direction =
and in fact Dino's LISP was one of the strongest candidates there as =
control plane.=20

The IETF=E2=80=99s LISP-DDT borrows ideas from DNS but does not need to =
be structured like the DNS deployed today. There is hierarchy for scale =
with iterative lookups, but we don=E2=80=99t have to allow it to get out =
of hand with too many levels of hierarchy.

Dino


From nobody Tue Sep 27 23:51:00 2016
Return-Path: <menth@uni-tuebingen.de>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D42FD12B26A; Tue, 27 Sep 2016 23:50:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.516
X-Spam-Level: 
X-Spam-Status: No, score=-6.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.316] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ik89pD8KvZDw; Tue, 27 Sep 2016 23:50:57 -0700 (PDT)
Received: from mx04.uni-tuebingen.de (mx04.uni-tuebingen.de [134.2.5.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4997C12B077; Tue, 27 Sep 2016 23:50:57 -0700 (PDT)
Received: from [192.168.1.100] (hsi-kbw-109-192-128-060.hsi6.kabel-badenwuerttemberg.de [109.192.128.60]) by mx04.uni-tuebingen.de (Postfix) with ESMTPSA id 76977E5117; Wed, 28 Sep 2016 08:50:55 +0200 (CEST)
To: Dino Farinacci <farinacci@gmail.com>, Robert Raszuk <robert@raszuk.net>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com> <8CA89FA5-D1AC-4D3B-8CB4-FD5E16DE8C4F@gmail.com>
From: Michael Menth <menth@uni-tuebingen.de>
X-Enigmail-Draft-Status: N1110
Message-ID: <57EB684E.1000601@uni-tuebingen.de>
Date: Wed, 28 Sep 2016 08:50:54 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <8CA89FA5-D1AC-4D3B-8CB4-FD5E16DE8C4F@gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/J80BRoVCjNxHRuxo1ijn08OR6Do>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>, Lin Han <Lin.Han@huawei.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 06:50:59 -0000

Hi Dino,

Am 28.09.2016 um 05:02 schrieb Dino Farinacci:
>> When I spoke to some of the 5G folks this was clearly the direction and in fact Dino's LISP was one of the strongest candidates there as control plane. 
> The IETF’s LISP-DDT borrows ideas from DNS but does not need to be structured like the DNS deployed today. There is hierarchy for scale with iterative lookups, but we don’t have to allow it to get out of hand with too many levels of hierarchy.
What do you mean by that exactly? What's the problem with DNS and what's
the advantage of LISP-DDT?

Michael

>
> Dino
>
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Tue Sep 27 23:58:00 2016
Return-Path: <menth@uni-tuebingen.de>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E9FC12B337; Tue, 27 Sep 2016 23:57:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.516
X-Spam-Level: 
X-Spam-Status: No, score=-6.516 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-2.316] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zTMgBJYqBiAF; Tue, 27 Sep 2016 23:57:53 -0700 (PDT)
Received: from mx04.uni-tuebingen.de (mx04.uni-tuebingen.de [134.2.5.214]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A27B12B38D; Tue, 27 Sep 2016 23:50:43 -0700 (PDT)
Received: from [192.168.1.100] (hsi-kbw-109-192-128-060.hsi6.kabel-badenwuerttemberg.de [109.192.128.60]) by mx04.uni-tuebingen.de (Postfix) with ESMTPSA id 5CC2BE5117; Wed, 28 Sep 2016 08:50:41 +0200 (CEST)
To: Dino Farinacci <farinacci@gmail.com>, Lin Han <Lin.Han@huawei.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <ADE71A46-ABEC-4043-B740-6FEF3ACBE035@gmail.com>
From: Michael Menth <menth@uni-tuebingen.de>
X-Enigmail-Draft-Status: N1110
Message-ID: <57EB6840.1070808@uni-tuebingen.de>
Date: Wed, 28 Sep 2016 08:50:40 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <ADE71A46-ABEC-4043-B740-6FEF3ACBE035@gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/18sglblxMylUKmJ4j95wB2jGJyk>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 06:57:54 -0000

Hi Dino,

Am 28.09.2016 um 04:59 schrieb Dino Farinacci:
>> One side is that the national security of US prefer the government operates the root DNS, another side is that other countries don’t like US to completely control the DNS.
> I see this hierarchy run by commercial companies that have monetary incentive to run a production level service. So for example, I could use a pair of roots from say a Verisign. Or a different pair of roots offered by an AT&T, or a possible a third-party that calls themselves a Mapping Service Provider (MSP).
>
> It is these roots at the top of the tree that need to connect to common parts in the middle and to the leaf map-servers of the tree.
>
>> This is related to both technology and politics. Without the support of other countries, mapping server deployment globally will be in question.
> If registrations and requests are encrypted, then anyone could run the roots and the what goes in and out of the mapping system stays private. But there needs to be competition so the level of service stays at a high-quality production level.
What is your vision? How much of the mapping data can be encrypted and
how much information about the mapping owner can be hidden from the
mapping system operator? The ID cannot be encrypted as it is used as
retrieval key. When we want to make sure that only rightful owners of
IDs can register, the mapping system provider needs to authenticate the
mapping owner. Can you elaborate the problem you are tackling and the
solution in more detail?

Michael


From nobody Wed Sep 28 02:24:55 2016
Return-Path: <session_request_developers@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F12E12B58E; Wed, 28 Sep 2016 02:24:53 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Meeting Session Request Tool\"" <session_request_developers@ietf.org>
To: <session-request@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.34.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147505469360.16545.11504437649087964541.idtracker@ietfa.amsl.com>
Date: Wed, 28 Sep 2016 02:24:53 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/Tkfq0T427afv3iSaA7TI-bnoXcQ>
Cc: lisp-chairs@ietf.org, lisp@ietf.org, luigi.iannone@telecom-paristech.fr
Subject: [lisp] lisp - New Meeting Session Request for IETF 97
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 09:24:53 -0000

A new meeting session request has just been submitted by Luigi Iannone, a Chair of the lisp working group.


---------------------------------------------------------
Working Group Name: Locator/ID Separation Protocol
Area Name: Routing Area
Session Requester: Luigi Iannone

Number of Sessions: 1
Length of Session(s):  1.5 Hours
Number of Attendees: 50
Conflicts to Avoid: 
 First Priority: rtgwg nvo3 i2rs sidr grow sfc sdnrg nfvrg pim intarea
 Second Priority: mboned icnrg irtfopen idr spring bier maprg
 Third Priority: l2tpext bess


Special Requests:
  
---------------------------------------------------------


From nobody Wed Sep 28 07:05:03 2016
Return-Path: <internet-drafts@ietf.org>
X-Original-To: lisp@ietf.org
Delivered-To: lisp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 459DB12B166; Wed, 28 Sep 2016 07:04:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.34.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147507149727.16539.11556071735672545257.idtracker@ietfa.amsl.com>
Date: Wed, 28 Sep 2016 07:04:57 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/w4VuTnFHayySwTh6Ae70qgq5v3U>
Cc: lisp@ietf.org
Subject: [lisp] I-D Action: draft-ietf-lisp-type-iana-02.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 14:04:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Locator/ID Separation Protocol of the IETF.

        Title           : LISP Experimental Message & IANA Registry for LISP Packet Type Allocations
        Authors         : Mohamed Boucadair
                          Christian Jacquenet
	Filename        : draft-ietf-lisp-type-iana-02.txt
	Pages           : 5
	Date            : 2016-09-28

Abstract:
   This document defines a registry for LISP Packet Type allocations.
   It also specifies a shared LISP message type for experimentation
   purposes.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-type-iana/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-lisp-type-iana-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-lisp-type-iana-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Sep 28 13:24:46 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4720E12B2C4; Wed, 28 Sep 2016 13:24:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvYc7g0tcpTt; Wed, 28 Sep 2016 13:24:42 -0700 (PDT)
Received: from mail-pf0-x22b.google.com (mail-pf0-x22b.google.com [IPv6:2607:f8b0:400e:c00::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91F93127058; Wed, 28 Sep 2016 13:24:42 -0700 (PDT)
Received: by mail-pf0-x22b.google.com with SMTP id 21so20823136pfy.0; Wed, 28 Sep 2016 13:24:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ggzbmrr+znHGrbOtAA9QCo4ZlWm4oc7rDg5fA/IVJF4=; b=dT37GfdwW/Tf6GTa0NlZHuS98e8NROcGAcFQzI7/pHqMJCZpcSqkRiCNBGSSgw+0fk XzAZcS1BK7aoEo7gjdG/FrQsIQ5w6fK+umUDHklIdtj4t3Wd+3HNhMmHbIPhiJvY3FK8 8SS8Ex03mziWsFYH3FOP8IpPVAAO747WVZB4fEb9Wg57LE94+8VgMbNg0IGog3W0uf87 yGmCzv6qnqNtF1c0ub3N4oFxG8shlKLCQdVjpZTie6wClYJ1DI8XCw1bL2zSD28o7Cag cFFkXUhkxxpHi+A7Bph5/WvtcnCZxWofYWgvmq0BW4h/0UFFEU4HaUH5Nczis4fAkw7x i3FA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ggzbmrr+znHGrbOtAA9QCo4ZlWm4oc7rDg5fA/IVJF4=; b=V9uu/yW/gz8tmCChymPU0Yb1ouJqDmCjaJxY80JkDhNNYIhsNYche0z5CxguVkdBGl nNmN8fUDfS0PRjjwawEBkVaOlREJFjvFQPamaaYEpcfDPEdXrSdeCjf5kHcEabFh89rK r2szjPxD1O8EFYOZynaZjcu9L4T4I/I+rM//85JilGaD+o++RVX/keJ5Mlec//Q9hRz9 Zi+hQLpAg2gI4cFVfMdTJp242GPZ0wD0GxeQAUI+z83t3ecnCiSut4UmWkfcQrIbdomD LKaN7ly17nhq3o9MwKh3eiROSlG+B3BnmZ2WIwOtaDTleOVtQLgVeKveYm23K77TR7Io jT/A==
X-Gm-Message-State: AE9vXwMzUKJl53s5tbamyCapuxgaMYhGJU/+HOmF3ICFMb48Zdo1ep6DkvCLKLao0WpY2Q==
X-Received: by 10.98.155.7 with SMTP id r7mr59931543pfd.171.1475094282171; Wed, 28 Sep 2016 13:24:42 -0700 (PDT)
Received: from [10.197.31.157] ([216.216.202.69]) by smtp.gmail.com with ESMTPSA id 28sm14551129pfp.33.2016.09.28.13.24.40 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 28 Sep 2016 13:24:41 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <57EB6840.1070808@uni-tuebingen.de>
Date: Wed, 28 Sep 2016 13:24:31 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <737C63AF-6C5B-480C-B1EF-29AEBE0434EB@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <ADE71A46-ABEC-4043-B740-6FEF3ACBE035@gmail.com> <57EB6840.1070808@uni-tuebingen.de>
To: Michael Menth <menth@uni-tuebingen.de>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/7v5eOx38AphukHValk3-OUHIC6g>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>, Lin Han <Lin.Han@huawei.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 20:24:44 -0000

>> If registrations and requests are encrypted, then anyone could run =
the roots and the what goes in and out of the mapping system stays =
private. But there needs to be competition so the level of service stays =
at a high-quality production level.
> What is your vision? How much of the mapping data can be encrypted and
> how much information about the mapping owner can be hidden from the

Well I think we can encrypt the transport of messages from LISP sites to =
the mapping system. As to encrypting the stored state at the map-servers =
could also be done but here are some caveats:

(1) If the MSP is providing proxy-reply services it has to return =
Map-Replies to ITRs/PITRs. It can do so with lisp-sec for security. But =
the information needs to be stored in plaintext.

(2) All the map-servers need to know when they are not proxy-replying is =
to know the RLOCs of the ETRs of the site that registered the =
information (and not so much all of the RLOC-records that were =
registered) so the map-servers can forward Map-Requests to the ETRs so =
they can Map-Reply.

> mapping system operator? The ID cannot be encrypted as it is used as
> retrieval key. When we want to make sure that only rightful owners of

Right. At a minimum, the amount of plaintext that is stored in the =
map-servers are EID-prefix and the RLOCs in the RLOC-set (for case (2) =
above).

> IDs can register, the mapping system provider needs to authenticate =
the

That is done today with a Map-Register that contains an authentication =
hash across the entire Map-Register message.

> mapping owner. Can you elaborate the problem you are tackling and the
> solution in more detail?

I was solely asking if the messaging to the mapping system should be =
confidential.

Dino


From nobody Wed Sep 28 13:30:17 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 884D012B4A4; Wed, 28 Sep 2016 13:30:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eOPbMFHYFr4X; Wed, 28 Sep 2016 13:30:14 -0700 (PDT)
Received: from mail-pf0-x22c.google.com (mail-pf0-x22c.google.com [IPv6:2607:f8b0:400e:c00::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC32F12B2E1; Wed, 28 Sep 2016 13:30:14 -0700 (PDT)
Received: by mail-pf0-x22c.google.com with SMTP id s13so20831165pfd.2; Wed, 28 Sep 2016 13:30:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1bzZKdccEQlYzQYoQTBE1g1vaWdiiQDFahgs1l0uuUY=; b=eNNOyIVgHfLuVcmRDHl9/SH6o/DZKPe599U5D5dx8X0uFTAJ5r4Qzp/J6kzcr64+P0 0kc1+/lLrKZX6AdCqoX9pzWJ9IaWP0AovNJX4A58NVNVmdpQ17avA8LNRGqTUjSYgfxH CwqI0vOSvlZ3x8HW8sZYmBcyTz+mMb+7Vfmbomq7CkIsB/mW9/hrC2q5SmQuNap2KFZh mV+w14yEbC5wMIpAyW9W8HRfSnrch4AWy8NcHpq1KG2wCfk6C3UFOYWq25gtNL16FzUw T/0KUmdFCeKyLTRRyQkdpeffh0/0FasOjvRFEcUYvoK8GdJb4xZRrubfnwxdsN1wGgDC YDAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=1bzZKdccEQlYzQYoQTBE1g1vaWdiiQDFahgs1l0uuUY=; b=d9oO+1Na+R/XSx7lQJhK1yEdJF1qYRlQfFe0RkA7LK/kA6HQL58s2X9NqlyJFxe7fA De7eqyrq/dk1uA4l0CleSGF0ipfCOEKyqew8T9MURRVT7qwRGnkmao4ct3l5JMQRv8N0 TRpKKmNVQK5Va9oeB9rve5Hs1gjcSexE+ACD3Yb4t0AEXGdGk/oJZg3IpQPGNQw14eFi yvwdqGO7M1Yv0Kjs83OQ7TULeUoo86OuEo5Wg4h3+8eHjYNyOY/5rC9tOijNUWqyb2kX 5bKiHIvgEiJqfOb6ddPpOzAgMadLl+BjUAzdS6joaP9m6QuvcxzsLOagbyBdj++lXjeI pVlA==
X-Gm-Message-State: AE9vXwOc9KGcoIiGoJpUJKINmB3HYAfYVy70HE+UZnM+qewzrFvt+N6TbZm3fXsOh3kH6w==
X-Received: by 10.98.31.133 with SMTP id l5mr60005964pfj.178.1475094614248; Wed, 28 Sep 2016 13:30:14 -0700 (PDT)
Received: from [10.197.31.157] ([216.216.202.69]) by smtp.gmail.com with ESMTPSA id t5sm14581998pfi.26.2016.09.28.13.30.08 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 28 Sep 2016 13:30:13 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <57EB684E.1000601@uni-tuebingen.de>
Date: Wed, 28 Sep 2016 13:30:04 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <D080DFDA-7CCB-4ABB-8D62-1505072DD739@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com> <8CA89FA5-D1AC-4D3B-8CB4-FD5E16DE8C4F@gmail.com> <57EB684E.1000601@uni-tuebingen.de>
To: Michael Menth <menth@uni-tuebingen.de>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/5AlAOsiZGDuW10vFP_Tp_h9bliM>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>, Lin Han <Lin.Han@huawei.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 20:30:16 -0000

> Am 28.09.2016 um 05:02 schrieb Dino Farinacci:
>>> When I spoke to some of the 5G folks this was clearly the direction =
and in fact Dino's LISP was one of the strongest candidates there as =
control plane.=20
>> The IETF=E2=80=99s LISP-DDT borrows ideas from DNS but does not need =
to be structured like the DNS deployed today. There is hierarchy for =
scale with iterative lookups, but we don=E2=80=99t have to allow it to =
get out of hand with too many levels of hierarchy.
> What do you mean by that exactly? What's the problem with DNS and =
what's
> the advantage of LISP-DDT?

These were the main reasons we didn=E2=80=99t consider DNS as a mapping =
system back in the RRG days when we were designing the mapping system =
for LISP:

(1) DNS didn=E2=80=99t work easily on bit boundaries. So delegation =
would have to be on byte boundaries and that restricts the flexibility =
of how EID address allocation occurs on the LISP-DDT hierarchy.

(2) DNS doesn=E2=80=99t have a pub/sub model. LISP needed notification =
support so old RLOCs new when an EID has moved to a new set of RLOCs.

(3) Architecturally, we didn=E2=80=99t want routing information to be in =
an applicaiton Directory. Since DNS depends on routing, we didn=E2=80=99t =
want routing to depend on DNS and cause a circular dependency to be =
created.

(4) And we thought it would be too hard to get IETF to allow network =
layer information to be stored in what is really a application level =
database.

So the architectural definition of a LISP EID would be in the DNS =
pointed to by names and the dynamic binding of EIDs to RLOCs would be in =
a new network layer database, which we refer to as the LISP Mapping =
System.

Dino

>=20
> Michael
>=20
>>=20
>> Dino
>>=20
>> _______________________________________________
>> lisp mailing list
>> lisp@ietf.org
>> https://www.ietf.org/mailman/listinfo/lisp


From nobody Wed Sep 28 14:11:51 2016
Return-Path: <renwei.li@huawei.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86E5C12B127; Wed, 28 Sep 2016 14:11:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.536
X-Spam-Level: 
X-Spam-Status: No, score=-6.536 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uALO2QbSwnrJ; Wed, 28 Sep 2016 14:11:44 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0CC912B00E; Wed, 28 Sep 2016 14:11:43 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CSB76645; Wed, 28 Sep 2016 21:11:41 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 28 Sep 2016 22:11:40 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Wed, 28 Sep 2016 14:11:34 -0700
From: Richard Li <renwei.li@huawei.com>
To: "ideas@ietf.org" <ideas@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
Thread-Topic: RE: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
Thread-Index: AdIZzOP8v2BaiL1kTEal3ROYmzzdQA==
Date: Wed, 28 Sep 2016 21:11:34 +0000
Message-ID: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.212.246.254]
Content-Type: multipart/alternative; boundary="_000_F061CEB6876F904F8EA6D6B92877731C39C37147dfweml501mbb_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.57EC320E.0070, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: bbc91c133a4024ef7c50246026de9994
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/-N_FmlFlF7TweUwMYot866Z6JBY>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 21:11:46 -0000

--_000_F061CEB6876F904F8EA6D6B92877731C39C37147dfweml501mbb_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Dino and Padma,

With great interest, I have read draft-padma-ideas-problem-statement-00.txt=
.

Since some efforts have been made, at least partially, in LISP, why do we s=
till want to work on it? Appreciated if you could explain it a little bit.

Thanks,

Richard



--_000_F061CEB6876F904F8EA6D6B92877731C39C37147dfweml501mbb_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi Dino and Padma,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">With great interest, I have read draft-padma-ideas-p=
roblem-statement-00.txt.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Since some efforts have been made, at least partiall=
y, in LISP, why do we still want to work on it? Appreciated if you could ex=
plain it a little bit.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Richard<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_F061CEB6876F904F8EA6D6B92877731C39C37147dfweml501mbb_--


From nobody Wed Sep 28 15:21:28 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7834D12B00D; Wed, 28 Sep 2016 15:21:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B6VA7mZ0yy22; Wed, 28 Sep 2016 15:21:22 -0700 (PDT)
Received: from mail-qk0-x22a.google.com (mail-qk0-x22a.google.com [IPv6:2607:f8b0:400d:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 011B712B1F7; Wed, 28 Sep 2016 15:21:21 -0700 (PDT)
Received: by mail-qk0-x22a.google.com with SMTP id j129so53652578qkd.1; Wed, 28 Sep 2016 15:21:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=O0heCnjhIawhZGBDqEXqFIdA1XiPFbhWfXSYjF4M7ww=; b=wL3ZmzCWK3RXgllifCcE1LrAsZaOF3qLL+spfln/1iuzJoJu3yxwq+W/cI3rLT9iqi Kl3/NE1cEqOuBGf3f+wVID2vINCHQF1m7P+2eq6bEntKg8vzMrFSyM8sH+yczJ1sMzZd 6YtFnrxMIU7OFE8L5blXaBSb+HYGTIf6/cXgAdmSvJMuXh9Js2aGHvVNdkpmD+VJQlrQ qXZVEFrXDLpCNRxwXIi6md8T34It2YTzdPK6f4DfYeKpwWAcTxWkV0matwS/pvKXa2Pr /AU7GPTubZzwdNwkmN48jFNDQsZa75Cp9uW/Q2hnZ2g2HyDHZJ/9vvwru/X/8DhRxVv3 /wJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=O0heCnjhIawhZGBDqEXqFIdA1XiPFbhWfXSYjF4M7ww=; b=OegkJGHQuna1v+Pf3bF2AlnmV5JV+XxVZN2Yftx59RKJXuL9OOJUjRo+QAckr7sx6k mlXPtjjK4LCNvwegFjGfLCKkguQhbPX3osKoZIV5jkv2tEGXCmA5/IJ+OiaOZDr0nb5s i9vez9t4SJ3dY1to1fits3yKryITgaiiCz0jkgHqa+yGYuEzbXbGXci1p8rKuM4Uu2D4 HOy/OFWN38a1d147TrWMCfqqyV9vFVrVJBwQqihtgK2fk5fCKNY0ga5towjvIcbfD2s/ XCT1LyMu3UB6Tt4edPXgj5bCLICWXm7IMtXJ6xehTtrAe6+WN+ctCfN37KAjPNnS++r4 XWiQ==
X-Gm-Message-State: AA6/9RlNzA7Y6o72hBEcuzkKYVeTUuWKlSUhNNae9yoqlJ/fKjUeqkWoFq3nIXxSZM/NfQ==
X-Received: by 10.55.108.6 with SMTP id h6mr33527832qkc.289.1475101281201; Wed, 28 Sep 2016 15:21:21 -0700 (PDT)
Received: from [10.31.1.71] (ip-64-134-222-71.public.wayport.net. [64.134.222.71]) by smtp.gmail.com with ESMTPSA id z186sm4981727qkb.13.2016.09.28.15.21.20 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 28 Sep 2016 15:21:20 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb>
Date: Wed, 28 Sep 2016 15:21:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <DD6845A6-3B73-4C0F-9D52-1804C1DEAA56@gmail.com>
References: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb>
To: Richard Li <renwei.li@huawei.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ZHVQ7FAsJo9zVnqJ2ubda0r6vZw>
Cc: "ideas@ietf.org" <ideas@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 22:21:23 -0000

> Since some efforts have been made, at least partially, in LISP, why do =
we still want to work on it? Appreciated if you could explain it a =
little bit.

LISP is a solution. The draft is a requirements document. We need to =
generate requirements to decide if the LISP solution meets them.

It might sound backwards, but that is how it works out chronologically.

Dino


From nobody Wed Sep 28 16:51:39 2016
Return-Path: <padma@huawei.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 342AB12B1ED; Wed, 28 Sep 2016 16:51:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.537
X-Spam-Level: 
X-Spam-Status: No, score=-6.537 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FlD0CPhoNgXQ; Wed, 28 Sep 2016 16:51:36 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BFA012B03B; Wed, 28 Sep 2016 16:51:36 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml704-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CXC04435; Wed, 28 Sep 2016 23:51:34 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.218.25.35) by lhreml704-cah.china.huawei.com (10.201.5.130) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 29 Sep 2016 00:51:33 +0100
Received: from SJCEML701-CHM.china.huawei.com ([169.254.3.53]) by SJCEML702-CHM.china.huawei.com ([169.254.4.207]) with mapi id 14.03.0235.001;  Wed, 28 Sep 2016 16:51:23 -0700
From: Padmadevi Pillay Esnault <padma@huawei.com>
To: Dino Farinacci <farinacci@gmail.com>, Richard Li <renwei.li@huawei.com>
Thread-Topic: [Ideas] [lisp] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
Thread-Index: AdIZzOP8v2BaiL1kTEal3ROYmzzdQAARGsOAAAyKg6A=
Date: Wed, 28 Sep 2016 23:51:21 +0000
Message-ID: <EC7A99B9A59C1B4695037EEB5036666B90DC5E@SJCEML701-CHM.china.huawei.com>
References: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb> <DD6845A6-3B73-4C0F-9D52-1804C1DEAA56@gmail.com>
In-Reply-To: <DD6845A6-3B73-4C0F-9D52-1804C1DEAA56@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.109.111.182]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.57EC5786.0130, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=169.254.3.53, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 21593b2ea99517b86651e5381f2c8864
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/vnke3F9wdQLKxOBQN4f4eoDjVMg>
Cc: "ideas@ietf.org" <ideas@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Sep 2016 23:51:39 -0000

Hi Richard
 =20
Thank you for your comment.
 =20
The ideas problem statement is introducing a new Network Mapping Systems (N=
MS) in order to have an efficient interoperable solution between ID based p=
rotocols.=20

The LISP mapping system's main functionality is to provide the mapping of I=
D/LOC in LISP.
However, the NMS goal is to have a common control plane for multiple data-p=
lanes rather than one mapping system or scheme per protocol.

We also are building the NMS to cater for a wide variety of fixed and mobil=
ity cases including IoT, IP mobility and mobility over heterogeneous access=
 networks. The Network mapping systems may also have different scopes (loca=
l, regional or global) and be private or public as well.

The expectations is that the NMS will be a powerful extensible infrastructu=
re usable by all and not restricted to specific use cases.

Padma  =20

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Dino Farinacci
Sent: Wednesday, September 28, 2016 3:21 PM
To: Richard Li
Cc: ideas@ietf.org; lisp@ietf.org
Subject: Re: [Ideas] [lisp] Mapping System Requirements and draft-padma-ide=
as-problem-statement-00.txt

> Since some efforts have been made, at least partially, in LISP, why do we=
 still want to work on it? Appreciated if you could explain it a little bit=
.

LISP is a solution. The draft is a requirements document. We need to genera=
te requirements to decide if the LISP solution meets them.

It might sound backwards, but that is how it works out chronologically.

Dino

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas


From nobody Thu Sep 29 10:49:31 2016
Return-Path: <Lin.Han@huawei.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9C3312B123; Thu, 29 Sep 2016 10:49:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.537
X-Spam-Level: 
X-Spam-Status: No, score=-6.537 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g39cZ5h0L_bM; Thu, 29 Sep 2016 10:49:24 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCBEB12B0FA; Thu, 29 Sep 2016 10:49:23 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml706-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CXD42789; Thu, 29 Sep 2016 17:49:21 +0000 (GMT)
Received: from DFWEML702-CAH.china.huawei.com (10.193.5.176) by lhreml706-cah.china.huawei.com (10.201.5.182) with Microsoft SMTP Server (TLS) id 14.3.235.1; Thu, 29 Sep 2016 18:49:20 +0100
Received: from DFWEML501-MBB.china.huawei.com ([10.193.5.179]) by dfweml702-cah.china.huawei.com ([10.193.5.176]) with mapi id 14.03.0235.001; Thu, 29 Sep 2016 10:49:10 -0700
From: Lin Han <Lin.Han@huawei.com>
To: Padmadevi Pillay Esnault <padma@huawei.com>, Dino Farinacci <farinacci@gmail.com>, Richard Li <renwei.li@huawei.com>
Thread-Topic: [Ideas] [lisp] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
Thread-Index: AdIZzOP8v2BaiL1kTEal3ROYmzzdQAARGsOAAAyKg6AADWMFMA==
Date: Thu, 29 Sep 2016 17:49:09 +0000
Message-ID: <1D30AF33624CDD4A99E8C395069A2A162AFA9F91@dfweml501-mbb>
References: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb> <DD6845A6-3B73-4C0F-9D52-1804C1DEAA56@gmail.com> <EC7A99B9A59C1B4695037EEB5036666B90DC5E@SJCEML701-CHM.china.huawei.com>
In-Reply-To: <EC7A99B9A59C1B4695037EEB5036666B90DC5E@SJCEML701-CHM.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.213.64.181]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.57ED5421.0345, ss=1, re=0.000, recu=0.000, reip=0.000,  cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 21593b2ea99517b86651e5381f2c8864
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/KW2GfuHgdJvqHly0Nz0GyfdjrwQ>
Cc: "ideas@ietf.org" <ideas@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Sep 2016 17:49:27 -0000

Hi, Padma

This sounds interesting, are you saying that the mapping system will finall=
y support the interworking between different Loc/id protocols, such as LISP=
 and HIP and others?
Also, could you elaborate the "common control plane". This impressed me it =
will be a super-controller, isn't it?

Thanks

Lin

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Padmadevi Pillay E=
snault
Sent: Wednesday, September 28, 2016 4:51 PM
To: Dino Farinacci; Richard Li
Cc: ideas@ietf.org; lisp@ietf.org; Padmadevi Pillay Esnault
Subject: Re: [Ideas] [lisp] Mapping System Requirements and draft-padma-ide=
as-problem-statement-00.txt

Hi Richard
 =20
Thank you for your comment.
 =20
The ideas problem statement is introducing a new Network Mapping Systems (N=
MS) in order to have an efficient interoperable solution between ID based p=
rotocols.=20

The LISP mapping system's main functionality is to provide the mapping of I=
D/LOC in LISP.
However, the NMS goal is to have a common control plane for multiple data-p=
lanes rather than one mapping system or scheme per protocol.

We also are building the NMS to cater for a wide variety of fixed and mobil=
ity cases including IoT, IP mobility and mobility over heterogeneous access=
 networks. The Network mapping systems may also have different scopes (loca=
l, regional or global) and be private or public as well.

The expectations is that the NMS will be a powerful extensible infrastructu=
re usable by all and not restricted to specific use cases.

Padma  =20

-----Original Message-----
From: Ideas [mailto:ideas-bounces@ietf.org] On Behalf Of Dino Farinacci
Sent: Wednesday, September 28, 2016 3:21 PM
To: Richard Li
Cc: ideas@ietf.org; lisp@ietf.org
Subject: Re: [Ideas] [lisp] Mapping System Requirements and draft-padma-ide=
as-problem-statement-00.txt

> Since some efforts have been made, at least partially, in LISP, why do we=
 still want to work on it? Appreciated if you could explain it a little bit=
.

LISP is a solution. The draft is a requirements document. We need to genera=
te requirements to decide if the LISP solution meets them.

It might sound backwards, but that is how it works out chronologically.

Dino

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas

_______________________________________________
Ideas mailing list
Ideas@ietf.org
https://www.ietf.org/mailman/listinfo/ideas


From nobody Thu Sep 29 11:19:51 2016
Return-Path: <sbarkai@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C031C12B209; Thu, 29 Sep 2016 11:19:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aRDtxeMa9G4o; Thu, 29 Sep 2016 11:19:47 -0700 (PDT)
Received: from mail-pf0-x22d.google.com (mail-pf0-x22d.google.com [IPv6:2607:f8b0:400e:c00::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22B1C12B1BD; Thu, 29 Sep 2016 11:19:47 -0700 (PDT)
Received: by mail-pf0-x22d.google.com with SMTP id u78so6069005pfa.1; Thu, 29 Sep 2016 11:19:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=fasOzddVEeyM3iY1w1q4xOEGaXRaOicg1MQBbFfQI6c=; b=pSl1lNn8HNWpZoCD5hHLxmNU3AdWLvQjZejzfq8bPzSv77pZLK/BSpFkBXv7apX94B AeFGWL3yD+62nYlW1qnLchdWXrkd0PpZSBXqCsxcP24G0cf8WO/Ow6niNCDvIDmW3xSW ChD76GkvnHt510gYcsYWFc+gOD+ON+zCCCmymBh+qdIo9O53QckfMLLZyqxIWXAvcuQB l9naofV16z4t303KUKue21Yt3giOA9D3OVTlPPhYDC1xki2BH9mF/iQx/zzSbAw3qd58 NtZp8guEnPO/gb5AVOLCz037kMkcoQzB0y6vSmXv3goYjF75O36XGPa4/B23wIMh39QC ki0w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=fasOzddVEeyM3iY1w1q4xOEGaXRaOicg1MQBbFfQI6c=; b=BbBowap9BYc8b0cNL+iIjg4lBrP7x73RdBOU4MUawTnSlq+dKBbIIlskZGInmv9IyA rtEMUoV3LrMDMs+Cbt9M8aKuGsfzRYJOazNkcNzF4Dw4EkfHrkMwqtXVsvc9tXGJ5sqd luij7oSRAtEAtSmgqM90rM3cVZ1oDflUdty7YCDs8zd5HEXi84B5scs1uJido9Isg52a nQQ2lOOBFX8LA4X4f8/drxvmru9fEo71u8RgeZPlfgmkvDcyCas4ww30o53i3A7RQ6ht 9xGZe0nHGrIRVSJWGID6gGI/jGFaZJ7wdaWYEsW2gBLqMqBcaf5Esd/ETMBv8pthRYua xBGg==
X-Gm-Message-State: AA6/9RmEmoFUgbHZCw7K5A6pV9Iy+y10KLqN+Q3drjzScnEehnZQVhHIMjjwlOfoK7jQNQ==
X-Received: by 10.98.217.199 with SMTP id b68mr4750710pfl.74.1475173186711; Thu, 29 Sep 2016 11:19:46 -0700 (PDT)
Received: from ?IPv6:2600:1010:b044:4e28:25cd:6dc8:4893:9cf3? ([2600:1010:b044:4e28:25cd:6dc8:4893:9cf3]) by smtp.gmail.com with ESMTPSA id z66sm14006769pfd.11.2016.09.29.11.19.44 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 29 Sep 2016 11:19:45 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Sharon <sbarkai@gmail.com>
X-Mailer: iPhone Mail (14A456)
In-Reply-To: <D080DFDA-7CCB-4ABB-8D62-1505072DD739@gmail.com>
Date: Thu, 29 Sep 2016 11:19:43 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <E4146ED1-4D2D-47E9-99D4-EE6A4BDB9C1B@gmail.com>
References: <32C28142-350A-4242-A9C6-9E32D9966601@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162A600B3E@SJCEML701-CHM.china.huawei.com> <CA+b+ER=JhWHkDWgJhwpxUs8MWHr_yuRvqSeWgMuaJofkX_5QVg@mail.gmail.com> <8CA89FA5-D1AC-4D3B-8CB4-FD5E16DE8C4F@gmail.com> <57EB684E.1000601@uni-tuebingen.de> <D080DFDA-7CCB-4ABB-8D62-1505072DD739@gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/1Z7ojbZ3MaSqUol285Zud1VuVbY>
Cc: "beta@lispers.net" <beta@lispers.net>, "ideas@ietf.org" <ideas@ietf.org>, LISP mailing list list <lisp@ietf.org>, NVO3 <nvo3@ietf.org>, "lisp-alpha@external.cisco.com" <lisp-alpha@external.cisco.com>, LISPmob <users@lispmob.org>, "5gangip@ietf.org" <5gangip@ietf.org>, "lisp-ops@external.cisco.com" <lisp-ops@external.cisco.com>, Lin Han <Lin.Han@huawei.com>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Sep 2016 18:19:50 -0000

Can add that we don't want to scale a mapping service like dns or x500. rath=
er take full advantage of no-sql tech that wasn't available at the time to c=
reate a flat pub-nub like service for overlays, scaled based on underlay reg=
ular IP. No bootstrap loop.

The effect on mobile can be dramatic, any packet coming up from the base-sta=
tion, no matter the address space or transience can be considered Gi. No nee=
d for a whole different sets of framework for network functions pre Gi and p=
ost Gi. There's the RAN and there's virtual IP (NVO3). Or rather (flat ) dir=
ectory-assisted virtual IP. traffic going back and forth:
                           =20
                            Mapping=20
                       |                        |
RAN <> NVO3 <> IP <> NVO3 <> Internet=20
                     |                            |
             Functions            Functions=20
           (scheduling)          (peering)



--szb

On Sep 28, 2016, at 1:30 PM, Dino Farinacci <farinacci@gmail.com> wrote:

>> Am 28.09.2016 um 05:02 schrieb Dino Farinacci:
>>>> When I spoke to some of the 5G folks this was clearly the direction and=
 in fact Dino's LISP was one of the strongest candidates there as control pl=
ane.=20
>>> The IETF=E2=80=99s LISP-DDT borrows ideas from DNS but does not need to b=
e structured like the DNS deployed today. There is hierarchy for scale with i=
terative lookups, but we don=E2=80=99t have to allow it to get out of hand w=
ith too many levels of hierarchy.
>> What do you mean by that exactly? What's the problem with DNS and what's
>> the advantage of LISP-DDT?
>=20
> These were the main reasons we didn=E2=80=99t consider DNS as a mapping sy=
stem back in the RRG days when we were designing the mapping system for LISP=
:
>=20
> (1) DNS didn=E2=80=99t work easily on bit boundaries. So delegation would h=
ave to be on byte boundaries and that restricts the flexibility of how EID a=
ddress allocation occurs on the LISP-DDT hierarchy.
>=20
> (2) DNS doesn=E2=80=99t have a pub/sub model. LISP needed notification sup=
port so old RLOCs new when an EID has moved to a new set of RLOCs.
>=20
> (3) Architecturally, we didn=E2=80=99t want routing information to be in a=
n applicaiton Directory. Since DNS depends on routing, we didn=E2=80=99t wan=
t routing to depend on DNS and cause a circular dependency to be created.
>=20
> (4) And we thought it would be too hard to get IETF to allow network layer=
 information to be stored in what is really a application level database.
>=20
> So the architectural definition of a LISP EID would be in the DNS pointed t=
o by names and the dynamic binding of EIDs to RLOCs would be in a new networ=
k layer database, which we refer to as the LISP Mapping System.
>=20
> Dino
>=20
>>=20
>> Michael
>>=20
>>>=20
>>> Dino
>>>=20
>>> _______________________________________________
>>> lisp mailing list
>>> lisp@ietf.org
>>> https://www.ietf.org/mailman/listinfo/lisp
>=20
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp


From nobody Thu Sep 29 11:21:24 2016
Return-Path: <farinacci@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0B4C12B21C; Thu, 29 Sep 2016 11:21:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Ot8WQTz6Fdz; Thu, 29 Sep 2016 11:21:20 -0700 (PDT)
Received: from mail-pa0-x22a.google.com (mail-pa0-x22a.google.com [IPv6:2607:f8b0:400e:c03::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 853DE12B22B; Thu, 29 Sep 2016 11:21:16 -0700 (PDT)
Received: by mail-pa0-x22a.google.com with SMTP id oz2so30090134pac.2; Thu, 29 Sep 2016 11:21:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=69uVCUkYxgw7mAuMRPRq8wjsLhrTMtfbGXDtVl28L1Q=; b=gREu4tm0eZC8Fkt/GRcQJYx24UJqsxndm7H/hqm3UIkueEHDJxgBYURlvAr/TKZHXi nu9HFadWMOLDP8P8u1msD59vGrCOiOdiRIO/zSzekcDiQfoeKuh6dtXkzfv9sol5R1Nc ipbJDk1qJI/go4SyXnTJYdMmt+KLF1Q1qogOnTyg9VoZRnAw2u9XAHoafeUcW8A+XxHd t+yKGEz/sotQ/1Ih84Al/XPstkLSSHl5IljKbxZXz5N2ofLBc0OukXjt6j0vSG+K7qcY OmtySg+utiGRfIODhe80EM/pycIpSzmifeewLQAMpVoIWz2TEWHr4Vaku5aJ+1JmI5dM 96vw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=69uVCUkYxgw7mAuMRPRq8wjsLhrTMtfbGXDtVl28L1Q=; b=OKTYNOF5/ApW52nLQ5f7//L2Rdmfae6gbF51Lie9Gqja7BLWBmJavflU5CDDJp6Qoz UUmfFOyqUy1RSAjDTLtTC4AhVlx8iwBKovZmkZSNhVCyfB0yitKJv3h8oAAlPVBs/16l xTI7biwl0as55v3mXclHoB7ValWoNX+8zaDEHIXXYCGPQ2o+kIUps9dhT1i0tTD0cvns /j2bwlPY9cDmuGVwmDNjyoHsbWScwFcvy6buoeTFeDWZTF3AojZ3msL6Au89wRt6e+Eo XNmylQ7MUVq0WlFxukCvPR4dzZk2hVkL+3Nel7QJFXrSUq7xMgK1b5FbHectiw7hHCr9 LQXg==
X-Gm-Message-State: AA6/9RnlXDENH7E1lcuMvPzas7w6lN9UXFGoTBq5edrFZkKxfSVHz9z1AWkoQp4cKkkPSQ==
X-Received: by 10.66.197.197 with SMTP id iw5mr4636957pac.130.1475173276215; Thu, 29 Sep 2016 11:21:16 -0700 (PDT)
Received: from [10.197.31.157] (173-11-119-245-SFBA.hfc.comcastbusiness.net. [173.11.119.245]) by smtp.gmail.com with ESMTPSA id c66sm21931250pfd.24.2016.09.29.11.21.15 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 29 Sep 2016 11:21:15 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dino Farinacci <farinacci@gmail.com>
In-Reply-To: <1D30AF33624CDD4A99E8C395069A2A162AFA9F91@dfweml501-mbb>
Date: Thu, 29 Sep 2016 11:21:16 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <4AACB05E-43F5-4CF1-B433-C0100880B3FB@gmail.com>
References: <F061CEB6876F904F8EA6D6B92877731C39C37147@dfweml501-mbb> <DD6845A6-3B73-4C0F-9D52-1804C1DEAA56@gmail.com> <EC7A99B9A59C1B4695037EEB5036666B90DC5E@SJCEML701-CHM.china.huawei.com> <1D30AF33624CDD4A99E8C395069A2A162AFA9F91@dfweml501-mbb>
To: Lin Han <Lin.Han@huawei.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/DjoAPGT2ku2QJc9rhAKOhscYIrg>
Cc: "ideas@ietf.org" <ideas@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
Subject: Re: [lisp] [Ideas] Mapping System Requirements and draft-padma-ideas-problem-statement-00.txt
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Sep 2016 18:21:23 -0000

> This sounds interesting, are you saying that the mapping system will =
finally support the interworking between different Loc/id protocols, =
such as LISP and HIP and others?
> Also, could you elaborate the "common control plane". This impressed =
me it will be a super-controller, isn't it?

I don=E2=80=99t see any reason why a HIP host cannot send LISP =
Map-Requests and Map-Registers to a LISP mapping system. It could do it =
for any EID type, even though a HIT is a perfectly fine EID key to use.

Dino

