[Ila] Second round draft charter

Tom Herbert <tom@quantonium.net> Fri, 09 February 2018 00:03 UTC

Return-Path: <tom@quantonium.net>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48293126CBF for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 16:03:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.111
X-Spam-Level:
X-Spam-Status: No, score=0.111 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=quantonium-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hPG2Lj675BiZ for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 16:03:43 -0800 (PST)
Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCF60124F57 for <ila@ietf.org>; Thu, 8 Feb 2018 16:03:42 -0800 (PST)
Received: by mail-wm0-x22e.google.com with SMTP id j21so1621670wmh.1 for <ila@ietf.org>; Thu, 08 Feb 2018 16:03:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quantonium-net.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=JFSHk9gRScEG+wSNY+ewpN6BsXXDauGlEwGU81947Yg=; b=wVAuiSjJD+agHpB5zwr182J1x+PbmbxMpuCfwQ15kGByUje5zdkbyIIEGKbJ/cQTAe lt/tVmPRDRysBtchbxChNlTrC7SIgT1P6b9NO5RXT1NrjLNq8ITIQDh6KQwcAZdj0kg5 +0kc0HFL4f2RtiAOG5q1wBzkoEstlgP80dB/IDzNaV1fF1WuxlQ50jrOx32He2MjVzwo DcFihqD7H90IafrJj6sTNZInqUhfWhG4JjSYex9xVaJ94b88ZOShy3qNjGnvW/SZ2VSp q6adgiiPDvZzQJULHrNUF1a7BfLUvv4OY757QvI37ZjMUwJkXTMIjwlgyu9JjuYkgDR3 lSzQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=JFSHk9gRScEG+wSNY+ewpN6BsXXDauGlEwGU81947Yg=; b=O3xEMZ/NIiYVn+SkGbW4DlWGDvHIWPoE7btKMGYrsoi3sMJdQz+OqJmlbxSjOZOH6y LQ/nF8yGA6mWcwK7EkjVj7DMLGX0qbliVCtpKYCs44nIWv1Hu8r7XJCbq1io6yX6ZbgE qecGgtLaWqdSyvC37uJM2y/37cHA0NC3gDOGIipA7gE+/swS4SB0LF7v1dywUZjGylEM oSnBBAXOQFpP06tm/di1g8kdHMXsVMzmiF9S5cfHfSheR9BfY+rGc/AVFmMQzXPy6WZP Vi4n6sdKPvSy8cJ3ONSo8caSRuGnyt/A1Oypc/mwY8fWOmXD/WM8EFDUk39VD6a3/wCh bZPw==
X-Gm-Message-State: APf1xPALLNCbWY01WozXQUg1V6LznpnZIA0gfx5y++0GDH8NO5OJg3Em twwP8XoScEiBoVS6mXA/1ruR/LiEjD5zA4nzDYxajjyK
X-Google-Smtp-Source: AH8x22668tRkp4B4GTcjwPs/jgtS+PzCmxsZIRoRrSPRWPVOsR0qGBwWw6+dGONun2PpROWzzX0lkH6L4cCCN3tUNts=
X-Received: by 10.28.156.81 with SMTP id f78mr525277wme.131.1518134620948; Thu, 08 Feb 2018 16:03:40 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.173.66 with HTTP; Thu, 8 Feb 2018 16:03:40 -0800 (PST)
From: Tom Herbert <tom@quantonium.net>
Date: Thu, 08 Feb 2018 16:03:40 -0800
Message-ID: <CAPDqMeqgk2WtkfCkyeYduGuawWL9OuSaQ3vH8BYoTAu2UiXxaQ@mail.gmail.com>
To: ila@ietf.org, "Bogineni, Kalyani" <kalyani.bogineni@verizonwireless.com>
Content-Type: multipart/alternative; boundary="001a114b2dc2cdbdea0564bc4219"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/OkTfFahr8W35ZaOsoPYN4RId0lE>
Subject: [Ila] Second round draft charter
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 00:03:45 -0000

Hello,


I Incorporated feedback from the first draft including replacing
"translation" with "transformation". Aldo, incorporated some of the
language from the BOF description.


Please comment!


Thanks,

Tom

------

Identifier-Locator Addressing (ILA) is a protocol to implement transparent
network overlays without encapsulation. It addresses the need for network
overlays in virtualization and mobility that are efficient, lightweight,
performant, scalable, secure, provide seamless mobility, leverage and
encourage use of IPv6, provide strong privacy, are interoperable with
existing infrastructure, applicable to a variety of use cases, and have
simplified control and management.

The use cases of ILA include mobile networks, datacenter virtualization,
and network virtualization. A recent trend in the industry is to build
converged networks containing all three of these to provide low latency and
high availability. A single network overlay solution that works across
multiple use cases is appealing.

ILA is a form of identifier/locator split where IPv6 addresses are
transformed from application-visible, non-topological “identifier”
addresses to topological “locator” addresses. Locator addresses allow
packets to be forwarded to the network location where a logical or mobile
node currently resides or is attached. Before delivery to the ultimate
destination, addresses are reverse transformed back to the original
application visible addresses. ILA does address “transformation” as opposed
to “translation” since address modifications are always undone. ILA is
conceptually similar to ILNP and 8+8, however ILA is contained in the
network layer. It is not limited to end node deployment, does not require
any changes to transport layer protocols, and does not use extension
headers.

ILA includes both a data plane and control plane. The data plane defines
the address structure and mechanisms for transforming application visible
identifier addresses to locator addresses. The control plane’s primary
focus is a mapping system that includes a database of identifier to locator
mappings. This mapping database drives ILA transformations. Control plane
protocols disseminate identifier to locator mappings amongst ILA nodes.

The goal of this group is to elaborate on use cases, problems, and
solution. The expected output is documents that specify the ILA data plane
and control plane. Similar to IP routing, different control plane protocols
may be defined for different use cases. This group will define at least one
control plane reference protocol.

The group will pay particular attention to privacy, secure, and scalability
characteristics of the solution. A goal of ILA is to facilitate strong user
privacy in addresses; this is achieved by purging IP addresses of hierarchy
that could be used to infer geo-location, and also by allowing applications
to use source addresses for different flows to prevent unwanted
correlations being being made by a third party . Also, the mapping system
contains personally identifiable information (PII) that can reveal user
identities or physical location of users, hence access to the mapping
system must be strictly controlled. The mapping system must be resilient to
Denial of Service attack. Scalability of both the deployment architecture
and mapping system is important since the number of identifiers in a
network is expected to be in the billions.

This group will try to reuse relevant technologies from existing mobility
and encapsulation solutions. It will also leverage recent work in scalable
distributed databases and key-value stores. The work produced by this group
may be relevant to DMM, nvo3, LISP, int-area, v6ops working groups in IETF,
as well as other SDOs such as 3GPP.