[Ila] Second round draft charter
Tom Herbert <tom@quantonium.net> Fri, 09 February 2018 00:03 UTC
Return-Path: <tom@quantonium.net>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48293126CBF for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 16:03:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.111
X-Spam-Level:
X-Spam-Status: No, score=0.111 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=quantonium-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hPG2Lj675BiZ for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 16:03:43 -0800 (PST)
Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCF60124F57 for <ila@ietf.org>; Thu, 8 Feb 2018 16:03:42 -0800 (PST)
Received: by mail-wm0-x22e.google.com with SMTP id j21so1621670wmh.1 for <ila@ietf.org>; Thu, 08 Feb 2018 16:03:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quantonium-net.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=JFSHk9gRScEG+wSNY+ewpN6BsXXDauGlEwGU81947Yg=; b=wVAuiSjJD+agHpB5zwr182J1x+PbmbxMpuCfwQ15kGByUje5zdkbyIIEGKbJ/cQTAe lt/tVmPRDRysBtchbxChNlTrC7SIgT1P6b9NO5RXT1NrjLNq8ITIQDh6KQwcAZdj0kg5 +0kc0HFL4f2RtiAOG5q1wBzkoEstlgP80dB/IDzNaV1fF1WuxlQ50jrOx32He2MjVzwo DcFihqD7H90IafrJj6sTNZInqUhfWhG4JjSYex9xVaJ94b88ZOShy3qNjGnvW/SZ2VSp q6adgiiPDvZzQJULHrNUF1a7BfLUvv4OY757QvI37ZjMUwJkXTMIjwlgyu9JjuYkgDR3 lSzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=JFSHk9gRScEG+wSNY+ewpN6BsXXDauGlEwGU81947Yg=; b=O3xEMZ/NIiYVn+SkGbW4DlWGDvHIWPoE7btKMGYrsoi3sMJdQz+OqJmlbxSjOZOH6y LQ/nF8yGA6mWcwK7EkjVj7DMLGX0qbliVCtpKYCs44nIWv1Hu8r7XJCbq1io6yX6ZbgE qecGgtLaWqdSyvC37uJM2y/37cHA0NC3gDOGIipA7gE+/swS4SB0LF7v1dywUZjGylEM oSnBBAXOQFpP06tm/di1g8kdHMXsVMzmiF9S5cfHfSheR9BfY+rGc/AVFmMQzXPy6WZP Vi4n6sdKPvSy8cJ3ONSo8caSRuGnyt/A1Oypc/mwY8fWOmXD/WM8EFDUk39VD6a3/wCh bZPw==
X-Gm-Message-State: APf1xPALLNCbWY01WozXQUg1V6LznpnZIA0gfx5y++0GDH8NO5OJg3Em twwP8XoScEiBoVS6mXA/1ruR/LiEjD5zA4nzDYxajjyK
X-Google-Smtp-Source: AH8x22668tRkp4B4GTcjwPs/jgtS+PzCmxsZIRoRrSPRWPVOsR0qGBwWw6+dGONun2PpROWzzX0lkH6L4cCCN3tUNts=
X-Received: by 10.28.156.81 with SMTP id f78mr525277wme.131.1518134620948; Thu, 08 Feb 2018 16:03:40 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.173.66 with HTTP; Thu, 8 Feb 2018 16:03:40 -0800 (PST)
From: Tom Herbert <tom@quantonium.net>
Date: Thu, 08 Feb 2018 16:03:40 -0800
Message-ID: <CAPDqMeqgk2WtkfCkyeYduGuawWL9OuSaQ3vH8BYoTAu2UiXxaQ@mail.gmail.com>
To: ila@ietf.org, "Bogineni, Kalyani" <kalyani.bogineni@verizonwireless.com>
Content-Type: multipart/alternative; boundary="001a114b2dc2cdbdea0564bc4219"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/OkTfFahr8W35ZaOsoPYN4RId0lE>
Subject: [Ila] Second round draft charter
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 00:03:45 -0000
Hello, I Incorporated feedback from the first draft including replacing "translation" with "transformation". Aldo, incorporated some of the language from the BOF description. Please comment! Thanks, Tom ------ Identifier-Locator Addressing (ILA) is a protocol to implement transparent network overlays without encapsulation. It addresses the need for network overlays in virtualization and mobility that are efficient, lightweight, performant, scalable, secure, provide seamless mobility, leverage and encourage use of IPv6, provide strong privacy, are interoperable with existing infrastructure, applicable to a variety of use cases, and have simplified control and management. The use cases of ILA include mobile networks, datacenter virtualization, and network virtualization. A recent trend in the industry is to build converged networks containing all three of these to provide low latency and high availability. A single network overlay solution that works across multiple use cases is appealing. ILA is a form of identifier/locator split where IPv6 addresses are transformed from application-visible, non-topological “identifier” addresses to topological “locator” addresses. Locator addresses allow packets to be forwarded to the network location where a logical or mobile node currently resides or is attached. Before delivery to the ultimate destination, addresses are reverse transformed back to the original application visible addresses. ILA does address “transformation” as opposed to “translation” since address modifications are always undone. ILA is conceptually similar to ILNP and 8+8, however ILA is contained in the network layer. It is not limited to end node deployment, does not require any changes to transport layer protocols, and does not use extension headers. ILA includes both a data plane and control plane. The data plane defines the address structure and mechanisms for transforming application visible identifier addresses to locator addresses. The control plane’s primary focus is a mapping system that includes a database of identifier to locator mappings. This mapping database drives ILA transformations. Control plane protocols disseminate identifier to locator mappings amongst ILA nodes. The goal of this group is to elaborate on use cases, problems, and solution. The expected output is documents that specify the ILA data plane and control plane. Similar to IP routing, different control plane protocols may be defined for different use cases. This group will define at least one control plane reference protocol. The group will pay particular attention to privacy, secure, and scalability characteristics of the solution. A goal of ILA is to facilitate strong user privacy in addresses; this is achieved by purging IP addresses of hierarchy that could be used to infer geo-location, and also by allowing applications to use source addresses for different flows to prevent unwanted correlations being being made by a third party . Also, the mapping system contains personally identifiable information (PII) that can reveal user identities or physical location of users, hence access to the mapping system must be strictly controlled. The mapping system must be resilient to Denial of Service attack. Scalability of both the deployment architecture and mapping system is important since the number of identifiers in a network is expected to be in the billions. This group will try to reuse relevant technologies from existing mobility and encapsulation solutions. It will also leverage recent work in scalable distributed databases and key-value stores. The work produced by this group may be relevant to DMM, nvo3, LISP, int-area, v6ops working groups in IETF, as well as other SDOs such as 3GPP.
- [Ila] Second round draft charter Tom Herbert
- Re: [Ila] Second round draft charter Uma Chunduri
- Re: [Ila] Second round draft charter Alexandre Petrescu
- Re: [Ila] Second round draft charter Tom Herbert
- Re: [Ila] Second round draft charter Alexandre Petrescu