Network Working Group M. Boc Internet-Draft C. Janneteau Intended status: Informational A. Petrescu Expires: January 14, 2012 CEA, LIST July 13, 2011 RO Extensions for PMIPv6-LR (ROEXT) draft-boc-netext-lr-roext-02.txt Abstract The communication path between two Hosts within a Proxy Mobile IPv6 domain is artificially long - it involves the LMA, even if straight paths exist (under same MAG, or MAG-to-MAG). Localized Routing PMIPv6-LR concepts developped by NETEXT WG make use of LRI/LRA messages to achieve optimized MAG-to-MAG straight paths. This may prove inconvenient for the network operator, in that it may loose ability to control traffic (LMA control point is skipped). In this draft we present a middle-ground solution. It employs new Intermediary Anchors (IAs) in the paths between MAGs and offers points of control of traffic useful for QoS and lawful interception. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 14, 2012. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents Boc, et al. Expires January 14, 2012 [Page 1] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English. Boc, et al. Expires January 14, 2012 [Page 2] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 Table of Contents 1. Requirements notation . . . . . . . . . . . . . . . . . . . . 4 2. Concentrated Description . . . . . . . . . . . . . . . . . . . 5 3. LMA Behaviour . . . . . . . . . . . . . . . . . . . . . . . . 9 4. MAG Behaviour . . . . . . . . . . . . . . . . . . . . . . . . 10 5. IA Behaviour . . . . . . . . . . . . . . . . . . . . . . . . . 11 6. Security Considerations . . . . . . . . . . . . . . . . . . . 12 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 13 8. Normative References . . . . . . . . . . . . . . . . . . . . . 14 Appendix A. ChangeLog . . . . . . . . . . . . . . . . . . . . . . 15 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16 Boc, et al. Expires January 14, 2012 [Page 3] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 1. Requirements notation The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. Boc, et al. Expires January 14, 2012 [Page 4] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 2. Concentrated Description The work presented in this draft is developped in the context of Proxy Mobile IPv6 [RFC5213] and uses LRI/LRA messages used by Localized Routing [I-D.ietf-netext-pmip-lr]. The relevant scenarios are represented by communication between two Hosts typically situated each under a different MAG. ----- ----- | LMA | | LMA | ----- ----- / \ / \ / / \ \ / \ / / \ \ / \signalling / /T1 \ \T2 / \ / \ / \ ----- ----- / \ | MAG1| | MAG2| / \ ----- ----- ----- ================== ----- | | | MAG1| Direct Tunnel | MAG2| | | ----- ----- --|-- --|-- | | |Host1| |Host2| --|-- --|-- ----- ----- |Host1| |Host2| ----- ----- In this figure, on the left side, the established tunnels T1 and T2 for communication between Host1 and Host2 are shown, after the Proxy Mobile IPv6 protocol has executed. Each tunnel is established between LMA and the MAG under which a Host is attached. This illustration is typically used to express a problem of too long communication paths. In the right part of the same figure, the Direct Tunnel between two MAGs is illustrated as a solution to the problem of artificially long paths through LMA. This is achieved by using Localized Routing concepts of Proxy Mobile IPv6. The diagonal lines represent signalling (not wires). There may exist situations when MAG-LMA-MAG communication paths are too long and yet the straight MAG-MAG paths may prove disadvantageous in terms of loss of operator control on various aspects of the traffic. A middle ground solution as a bent arch path (not fully Boc, et al. Expires January 14, 2012 [Page 5] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 triangular, not fully straight) may be needed. ----- | LMA | ----- / | \ / | \ / | \signalling / | \ / | \ / | \ / ---- \ ----- =====| IA |======= ----- | MAG1| T1 ---- T2 | MAG2| ----- ----- | | --|-- --|-- |Host1| |Host2| ----- ----- In this figure a new entity is added between MAGs - the Intermediate Anchor (IA). The tunnels T1 and T2 are established between the IA and the two MAGs respectively (instead of LMA). The IA serves purposes such as ensuring a certain level of control over the route optimized traffic, such as providing a certain level of Quality-of- Service, or, potentially, enabling data traffic enforcement for lawful interception. Several such IAs may be placed at strategic points within the Proxy Mobile IPv6 domain. The LMA is pre-configured statically with information about the IP addresses of all MAGs, and, new, IAs in the Proxy Mobile IPv6 domain. To illustrate this procedure in a generic manner, we consider two IAs instead of one. In the following figure, we assume that IA1 and IA2 are positioned in a "sequential" manner between the MAG1 and MAG2. This is to illustrate that the mechanism pertains to situations where more IAs are used, and not only one. Initially, H1 and H2 exchange Data through the tunnels setup by Proxy Mobile IPv6, via LMA and the respective MAGs (the first 4 double- arrowed lines at the top of the illustration) . Boc, et al. Expires January 14, 2012 [Page 6] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 H1 H2 MAG1 MAG2 IA1 IA2 LMA | | Data | | | | | |<---------------->| | | | Data | | | |<--------------------------------->| | | | | | | Data | via LMA | | | Data |<----------------------->| and MAG | |<----------------->| | | | | | | | | | | | | |[Trigger RO procedure] |LRI_IA1 | | | | | |<---------------| | | | | |LRA_IA1| | | | | | |--------------->| | | | | | |LRI_IA2 | RO | | | | | |<-------| configure | | | | | |LRA_IA2 | | | | | | |------->| | | | LRI_MAG1 | | | | | |<--------------------------------- | | | | LRA_MAG1 | | | | | |---------------------------------->| | | | | LRI_MAG2 | | | | | |<------------------------| | | | | LRA_MAG2 | | | | | |------------------------>| | Data | | | | | |<---------------->| Data | | | | | | |<---------------->| | | | | | | | Data | | | | | | |<----->| | | | | | Data | | | via IA | | | |<-------------->| | and MAG | | Data | | | | | | |<----------------->| | | | Subsequently, a certain trigger (to be defined) starts the Route Optimization procedure. The procedure consists in LRI and LRA messages. The LMA sends an LRI to IA1 and to IA2 respectively. In a same centralized manner, LMA sends the same type of messages to MAG1 and MAG2 respectively. There are as many LRI messages as there are IAs plus (always) two MAGs. The LRI messages instruct the receivers about the IP addresses of the entities in question. For example, LRI_IA1 informs IA1 about the IP address of IA2. When the last LRA has been received from a second MAG, it can be considered that the paths have been "route optimized", i.e. LMA is no longer in the path. The Data traffic between H1 and H2 is exchanged via IAs and MAGs exclusively (LMA is skipped). Boc, et al. Expires January 14, 2012 [Page 7] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 The following diagram shows a modified LRI message. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence # | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |R|S|I| Reserved | Lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | . . . Mobility options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 'I' flag: if set to 1 it indicates that this message is for an Intermediate Anchor. The following diagram shows a modified LRA message. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence # | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |R|U|I| Reserved| Status | Lifetime | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | . . . Mobility options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 'I' flag: if set to 1 it indicates that this message is is sent by an Intermediate Anchor. Boc, et al. Expires January 14, 2012 [Page 8] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 3. LMA Behaviour LMA is pre-configured with each address of each MAG and of each IA in the Proxy Mobile IPv6 domain. In addition, it has topology information about the placement of these entities (IA, MAG) with respect to each other, and can know the IP distances (hopcount) between each to each other. For example, for two given MAGs, it knows the shortest path and the IP addresses of the intervening IAs. LMA is expecting a trigger indicating that the Route Optimization procedure should start. This trigger is to be defined. In one sense, LMA could deduce this trigger when its Binding Cache is updated. Speculatively, the addresses stored in the Binding Cache could indicate that two Hosts are under MAGs of same LMA, and that their tunnels are using LMA. The LMA emits LRI messages and, for each LRI sent it waits for an LRA. It sends the following LRI only when the preceding LRI has been arcknowledged by an LRA. Boc, et al. Expires January 14, 2012 [Page 9] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 4. MAG Behaviour MAG receives LRI messages, and does not generate such. When LRI is received, it executes indications contained in it. Upon completion, it sends LRA to the originator of the LRI (the LMA) explaining the success or error of execution. MAG does not receive LRA. Boc, et al. Expires January 14, 2012 [Page 10] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 5. IA Behaviour IA behaviour is similar to that of MAG. Boc, et al. Expires January 14, 2012 [Page 11] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 6. Security Considerations Lawful interception is probably the single most unique kind of requirement difficult to fit within the otherwise very powerful security architecture of Internet. It is not immediately obvious whether techniques addressing this particular requirement effectively influence or are influenced by Internet security. LRI and LRA messages should be protected by using IPsec. Boc, et al. Expires January 14, 2012 [Page 12] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 7. Acknowledgements Other than Authors, a number of persons are involved with implementation and protection of this technique. For example, Sofiane Imadali is designing and implementing a testbed prototype with C, linux and Ethernet, under wise guidance of advisor. Administratively, this work has been performed in the framework of CELTIC project CP7-011 MEVICO. The authors would like to acknowledge the contributions of their colleagues, although the views expressed are those of the authors and do not necessarily represent the project. Boc, et al. Expires January 14, 2012 [Page 13] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 8. Normative References [I-D.ietf-netext-pmip-lr] Krishnan, S., Koodli, R., Loureiro, P., Wu, W., and A. Dutta, "Localized Routing for Proxy Mobile IPv6", draft-ietf-netext-pmip-lr-03 (work in progress), June 2011. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5213] Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and B. Patil, "Proxy Mobile IPv6", RFC 5213, August 2008. Boc, et al. Expires January 14, 2012 [Page 14] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 Appendix A. ChangeLog The changes are listed in reverse chronological order, most recent changes appearing at the top of the list. From draft-boc-netext-lr-roext-01.txt to draft-boc-netext-lr-roext-02.txt: o Changed affiliation from "CEA LIST" to "CEA, LIST" to respect local guidelines. From draft-boc-netext-lr-roext-00.txt to draft-boc-netext-lr-roext-01.txt: o The -00 version was mostly a placeholder. Now with -01 we updated the message exchange diagram and added its respective explanatory text. o Added new sections intended to describe behaviour per entity (LMA, IA, MAG). Boc, et al. Expires January 14, 2012 [Page 15] Internet-Draft RO Extensions for PMIPv6-LR (ROEXT) July 2011 Authors' Addresses Michael Mathias Boc CEA, LIST Communicating Systems Laboratory, Point Courrier 94 Gif-sur-Yvette, F-91191 France Phone: +33 169083976 Email: michael.boc@cea.fr Christophe Janneteau CEA, LIST Communicating Systems Laboratory, Point Courrier 94 Gif-sur-Yvette, F-91191 France Phone: +33 169089182 Email: christophe.janneteau@cea.fr Alexandru Petrescu CEA, LIST Communicating Systems Laboratory, Point Courrier 94 Gif-sur-Yvette, F-91191 France Phone: +33 169089223 Email: alexandru.petrescu@cea.fr Boc, et al. Expires January 14, 2012 [Page 16]