Internet DRAFT - draft-sarikaya-6man-sadr-ra

draft-sarikaya-6man-sadr-ra







Network Working Group                                        B. Sarikaya
Internet-Draft                                                Huawei USA
Intended status: Standards Track                            June 8, 2015
Expires: December 10, 2015


          IPv6 RA Option for Source Address Dependent Routing
                     draft-sarikaya-6man-sadr-ra-03

Abstract

   This document proposes the router advertisement extensions for source
   address dependent routing.  New Router Advertisement option is
   defined for configuring route prefixes and their corresponding source
   prefixes on the mobile or fixed nodes.  Using this option, an
   operator can easily configure nodes with multiple interfaces (or
   otherwise multi-homed) to enable them to select the routes to a
   destination.  The option is defined together with definitions of host
   and router behaviors.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on December 10, 2015.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must



Sarikaya                Expires December 10, 2015               [Page 1]

Internet-Draft               New RA Options                    June 2015


   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   2
   3.  Default Route Configuration . . . . . . . . . . . . . . . . .   3
   4.  Source Address Dependent Routing  . . . . . . . . . . . . . .   4
   5.  Host Configuration  . . . . . . . . . . . . . . . . . . . . .   4
   6.  Router Configuration  . . . . . . . . . . . . . . . . . . . .   5
   7.  Route Prefix with Source Address/Prefix Option  . . . . . . .   6
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   7
   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .   7
     11.1.  Normative References . . . . . . . . . . . . . . . . . .   7
     11.2.  Informative References . . . . . . . . . . . . . . . . .   8
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   9

1.  Introduction

   IPv6 Neighbor Discovery and IPv6 Stateless Address Autoconfiguration
   protocols can be used to configure fixed and mobile nodes with
   various parameters related to addressing and routing [RFC4861],
   [RFC4862], [RFC4191].  DNS Recursive Server Addresses and Domain Name
   Search Lists are additional parameters that can be configured using
   router advertisements [RFC6106].

   Router Advertisements can also be used to configure fixed and mobile
   nodes in multi-homed scenarios with route information and source
   address/prefix.  Different scenarios exist such as the node is
   simultaneously connected to multiple access network of e.g.  WiFi and
   3G.  The node may also be connected to more than one gateway.  Such
   connectivity may be realized by means of dedicated physical or
   logical links that may also be shared with other users nodes such as
   in residential access networks.

2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].







Sarikaya                Expires December 10, 2015               [Page 2]

Internet-Draft               New RA Options                    June 2015


3.  Default Route Configuration

   A host, usually a mobile host interested in obtaining routing
   information usually sends a Router Solicitation (RS) message on the
   link.  The router, when configured to do so, provides the route
   information using zero, one or more Route Prefix with Source Address/
   Prefix options in the router advertisement (RA) messages sent in
   response.

   The route option is extensible, as well as convey detailed
   information for routes.

   Source address/prefix and related route information are provided
   directly by the next hop routers.  In this document we assume that
   next hop routers are able to provide this information.

   A non-trustworthy network may be available at the same time as a
   trustworthy network, with the risk of bad consequences if the host
   gets confused between the two.  These are basically the two models
   for hosts with multiple interfaces, both of which are valid, but
   which are incompatible with each other.  In the first model, an
   interface is connected to something like a corporate network, over a
   Virtual Private Network (VPN).  This connection is trusted because it
   has been authenticated.  Routes obtained over such a connection can
   probably be trusted, and indeed it may be important to use those
   routes.  This is because in the VPN case, you may also be connected
   to a network that's offered you a default route, and you could be
   attacked over that connection if you attempt to connect to resources
   on the enterprise network over it.

   On the other, non-trustworthy network scenario, none of the networks
   to which the host is connected are meaningfully more or less
   trustworthy.  In this scenario, the untrustworthy network may hand
   out routes to other hosts, e.g. those in the VPN going through some
   malicious nodes.  This will have bad consequences because the host's
   traffic intended for the corporate VPN may be hijacked by the
   intermediate nodes.

   Router advertisement extensions described in this document can be
   used to install the routes.  However, the use of such a technique
   makes sense only in the former case above, i.e. trusted network.  So
   the host MUST have an authenticated connection to the network it
   connects so that the router advertisements can be trusted before
   establishing routes.







Sarikaya                Expires December 10, 2015               [Page 3]

Internet-Draft               New RA Options                    June 2015


4.  Source Address Dependent Routing

   In multihomed networks there is a need to do source address based
   routing if some providers are performing the ingress filtering
   defined in BCP38 [RFC2827].  This requires the routers to consider
   the source addresses as well as the destination addresses in
   determining the next hop to send the packet to.

   The routers may be informed about the source addresses to use in
   routing using extensions to the routing protocols like IS-IS defined
   in [ISO.10589.1992] [I-D.baker-ipv6-isis-dst-src-routing] and OSPF
   defined in [RFC5340] [I-D.baker-ipv6-ospf-dst-src-routing].  In this
   document we define the router advertisement extensions for source
   address dependent routing.

   Routing protocol extensions for source address dependent routing does
   not avoid a host using a source address that may be subject to
   ingress filtering when sending a packet to one of the next hops.  In
   that case the host receives an ICMP source address failed ingress/
   egress policy error message in which case the host must resend the
   packet trying a different source address.  The extensions defined in
   this document aims at avoiding this inefficiency in packet forwarding
   at the host.

   More information on the scenarios, their analysis and why host based
   approach to source address dependent routing is needed, are presented
   in [I-D.sarikaya-6man-sadr-overview].

5.  Host Configuration

   Router advertisement option defined in this document is used by Type
   C hosts.

   As defined in [RFC4191] Type C host uses a Routing Table instead of a
   Default Router List.

   The hosts set up their routing tables based on the router
   advertisement extensions defined in this document.  The routes
   established are used in forwarding the packets to a next hop based on
   the destination prefix/address using the longest match algorithm.
   The hosts MUST keep Route Prefix that it received together with the
   Source Address in a stable storage.  This will enable the host to
   consistently use these options as described next.

   When the host receives Router Prefix option with Source Address, the
   host uses source and destination prefix/address using the longest
   match algorithm in order to send its packets to this next hop router.




Sarikaya                Expires December 10, 2015               [Page 4]

Internet-Draft               New RA Options                    June 2015


   The routes advertised have route lifetime values.  The host considers
   the routes in its routing table stale when the lifetime expires.  The
   router MUST refresh these routes periodically in order to avoid stale
   routing table entries in the hosts.

   The hosts with ingress filtering policy do not receive Route
   Information Option defined in [RFC4191].  If they do the hosts MUST
   ignore the router advertisement messages with the Route Information
   Option.

6.  Router Configuration

   The router MAY send one or more Route Prefix options that represent
   the IPv6 destination prefixes reachable via the given next hop.
   Router includes Route Prefix option and Source Address/Prefix in the
   message to indicate that given prefix is available directly on-link
   and that any source addresses derived from the source prefix will not
   be subject to ingress filtering on these routes supported by these
   next hops.

   For the Source Address, Source Prefix option is used with prefix
   length set to 128.

   Each Route Prefix may be associated with zero, one or more Source
   Address/Prefixes that represent the source addresses that are
   assigned from the prefixes that belong to this router.  Route Prefix
   options represent the IPv6 destination prefixes reachable via the
   given next hop.  Router includes Route Prefix option in the message
   to indicate that given prefix is available directly on-link.  Route
   Prefix option MUST be followed by a Source Address/Prefix option all
   defined in Section 7 to indicate that any source addresses derived
   from the source prefix will not be subject to ingress filtering on
   these routes supported by these next hops.

   In home networks, each interface of the host can be configured using
   Router Advertisements sent from their next hop routers.  The Route
   Prefix with Source Address Option defined in Figure 1 is used to
   indicate that any source addresses derived from the source prefix
   will not be subject to ingress filtering on these routes supported by
   this router.

   Intermediate routers also need to take action in realizing the source
   address dependent routing.  These are defined for ISIS in
   [I-D.baker-ipv6-isis-dst-src-routing] and for OSPF in
   [I-D.baker-ipv6-ospf-dst-src-routing].

   In networks with ingress filtering policy, routers MUST associate the
   route prefixes they advertise with source address/prefixes.  This



Sarikaya                Expires December 10, 2015               [Page 5]

Internet-Draft               New RA Options                    June 2015


   means that routers MUST not advertise route prefixes alone, i.e.
   Route Information Option defined in [RFC4191].

7.  Route Prefix with Source Address/Prefix Option

        0                   1                   2                   3
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |     Type      |    Length     | Prefix Length |Resvd|Prf|Resvd|
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                        Route Lifetime                         |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                   Route Prefix (Variable Length)              |
       .                                                               .
       .                                                               .
       .                                                               .
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |SrcPrefixLength|                    Padding                    |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |      Source Address/Prefix Prefix (Variable Length)           |
       .                                                               .
       .                                                               .
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

         Figure 1: Route Prefix with Source Address/Prefix option

   Fields:

   Type: TBD.

   Length: The length of the option (including the type and length
   fields) in units of 8 octets.  For example, the length for a prefix
   of length 16 is 5.

   Prefix Length: 8-bit signed integer.  The number of leading bits in
   the Route Prefix that are valid.

   Prf: Route Preference.  As in [RFC4191].

   Route Lifetime: Time in seconds (relative to the time the packet is
   sent) that the prefix is valid for route determination.  A value of
   all one bits (0xffffffff) represents infinity.

   Route Prefix: Variable-length field containing an IP address or a
   prefix of an IP address.






Sarikaya                Expires December 10, 2015               [Page 6]

Internet-Draft               New RA Options                    June 2015


   SrcPrefixLength: 8-bit signed integer.  The number of leading bits in
   the Source Prefix that are valid.  It is 128 if this field represents
   an address.

   Padding field is used to insert 3 octets of zero.

   Source Prefix: Variable-length field containing an IP address or a
   prefix of an IP address padded to the next 8-bits boundary.

8.  Security Considerations

   Neighbor Discovery is subject to attacks that cause IP packets to
   flow to unexpected places.  Because of this, neighbor discovery
   messages SHOULD be secured, possibly using Secure Neighbor Discovery
   (SEND) protocol [RFC3971].

9.  IANA Considerations

   Authors of this document request IANA to assign the following new RA
   option:

           +------------------------------------------+-------+
           | Option Name                              | Type  |
           +------------------------------------------+-------+
           | Route Prefix with Source Address/Prefix  |       |
           +------------------------------------------+-------+

                                 Table 1:

10.  Acknowledgements

   TBD.

11.  References

11.1.  Normative References

   [ISO.10589.1992]
              International Organization for Standardization,
              "Intermediate system to intermediate system intra-domain-
              routing routine information exchange protocol for use in
              conjunction with the protocol for providing the
              connectionless-mode Network Service (ISO 8473), ISO
              Standard 10589", ISO ISO.10589.1992, 1992.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.




Sarikaya                Expires December 10, 2015               [Page 7]

Internet-Draft               New RA Options                    June 2015


   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, December 1998.

   [RFC2629]  Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
              June 1999.

   [RFC2827]  Ferguson, P. and D. Senie, "Network Ingress Filtering:
              Defeating Denial of Service Attacks which employ IP Source
              Address Spoofing", BCP 38, RFC 2827, May 2000.

   [RFC3971]  Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
              Neighbor Discovery (SEND)", RFC 3971, March 2005.

   [RFC4191]  Draves, R. and D. Thaler, "Default Router Preferences and
              More-Specific Routes", RFC 4191, November 2005.

   [RFC4605]  Fenner, B., He, H., Haberman, B., and H. Sandick,
              "Internet Group Management Protocol (IGMP) / Multicast
              Listener Discovery (MLD)-Based Multicast Forwarding
              ("IGMP/MLD Proxying")", RFC 4605, August 2006.

   [RFC4861]  Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
              "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
              September 2007.

   [RFC4862]  Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
              Address Autoconfiguration", RFC 4862, September 2007.

   [RFC5340]  Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
              for IPv6", RFC 5340, July 2008.

   [RFC7157]  Troan, O., Miles, D., Matsushima, S., Okimoto, T., and D.
              Wing, "IPv6 Multihoming without Network Address
              Translation", RFC 7157, March 2014.

11.2.  Informative References

   [I-D.baker-ipv6-isis-dst-src-routing]
              Baker, F. and D. Lamparter, "IPv6 Source/Destination
              Routing using IS-IS", draft-baker-ipv6-isis-dst-src-
              routing-02 (work in progress), October 2014.

   [I-D.baker-ipv6-ospf-dst-src-routing]
              Baker, F., "IPv6 Source/Destination Routing using OSPFv3",
              draft-baker-ipv6-ospf-dst-src-routing-03 (work in
              progress), August 2013.





Sarikaya                Expires December 10, 2015               [Page 8]

Internet-Draft               New RA Options                    June 2015


   [I-D.sarikaya-6man-sadr-overview]
              Sarikaya, B., "Source Address Dependent Routing and Source
              Address Selection for IPv6 Hosts", draft-sarikaya-6man-
              sadr-overview-06 (work in progress), March 2015.

   [RFC6106]  Jeong, J., Park, S., Beloeil, L., and S. Madanapalli,
              "IPv6 Router Advertisement Options for DNS Configuration",
              RFC 6106, November 2010.

Author's Address

   Behcet Sarikaya
   Huawei USA
   5340 Legacy Dr. Building 175
   Plano, TX  75024

   Email: sarikaya@ieee.org


































Sarikaya                Expires December 10, 2015               [Page 9]