Re: [Ila] [5gangip] Scaling mapping systems (was Re: BOF Description)

Lorenzo Colitti <lorenzo@google.com> Tue, 06 February 2018 06:34 UTC

Return-Path: <lorenzo@google.com>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A2EB126D46 for <ila@ietfa.amsl.com>; Mon, 5 Feb 2018 22:34:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level:
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eD85UExPYTcr for <ila@ietfa.amsl.com>; Mon, 5 Feb 2018 22:34:23 -0800 (PST)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F5CF1200C1 for <ila@ietf.org>; Mon, 5 Feb 2018 22:34:23 -0800 (PST)
Received: by mail-wm0-x235.google.com with SMTP id x4-v6so16264377wmc.0 for <ila@ietf.org>; Mon, 05 Feb 2018 22:34:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=XkFmviMekLNdB7bYFTu5BfDKhPakRvqzTkz7Ti7v1/A=; b=fj35vaYItuocO+UpZ0xHoHCiXFtxxKdaOoQpprQXRQ1/rBzqzJXPyXYQhxSOWNCRSc D7LZpr1BN8+lsUewTOhT4jjAy8YsTjSMUoKNf4XqRPHGHBHNMGT/pzYVFTKw6eZFu+mq njdhCDekDFIm9wDFQCh6A7KEjSJtROmRKXc8634sjf/6lCOdLwtdovdWpcQN733tnv8u dKXtj4s5Iun33zupSRdj+0RTLihkegMgj/3n6AOIUtzwkPhKJIye3oUaqG3KmO7Sm/DP FGESgIPPDWFdO4F11+0x4mdtnnFpEgnsv88KWyWNk1jMxys2yLJoxdopqmc3kCtWx5hE KVxQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=XkFmviMekLNdB7bYFTu5BfDKhPakRvqzTkz7Ti7v1/A=; b=j8IVUGmcrhpTlC58LvTTNF/y4kFRgZZO8O6jP5Tbg/GTp5DT37kKMOI/tLEOElM9j9 8nd9roVFCJcn80a6ZR6uysvVDQkkXWNOtuoai3KZNao9WPHFuxL0rwLUsOXqqDdXkWd0 XMdtCLCKKrg3wWW/zipW5VLqYLnoxFDU7a/VOEMbnR/0jAaX4r2oyvqO+Czrk+Rlw3QN IVNEOA6d91CKqgb+udWwnvXgNzgAtl9ixUWzkGnVzKO77+xBBtcFAfZFyFR8gsAJPu2z j4Cm1fBYya87zO5JQab4sXAsIG4/lMSvWijWqwTPsZvIEIp7FK/1nmkW9b5ulJdlX+hD YpVw==
X-Gm-Message-State: APf1xPBM+g0Ll50K6QRIdmSBMFFOrNWmswDhKenyK2nWaZMnzfT0INei +u9I5bwmSTKJ2JeHXfk+3FwtZ8JQuRgZeho907o/Eg==
X-Google-Smtp-Source: AH8x225FkPgxHWafz6+hnXCpxX8F4Apob7C5xvWyIYK3AQ3bl49NcaAGfLvNRFIOWRDraA6bZL4WSDBKznSoV8C6CcM=
X-Received: by 10.28.66.199 with SMTP id k68mr902380wmi.104.1517898861458; Mon, 05 Feb 2018 22:34:21 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.220.215 with HTTP; Mon, 5 Feb 2018 22:34:00 -0800 (PST)
In-Reply-To: <CAPDqMeoLPSGbFg_H-_yOPBguXhOmx8fXjzYd_ax1Qds56KibZQ@mail.gmail.com>
References: <CALx6S37+1PK3ET7g+XsCHt6-CJrABLko0YbWgE12xFX=vL5OPA@mail.gmail.com> <5067FA81-B416-4A19-9F11-A08B35BB8B6D@gmail.com> <CAPDqMeqNkiOWHOVU0AsUzFfPH60pTdS2x9CePhvZDhVLGJoGmw@mail.gmail.com> <9C425F56-738C-4600-9DFF-9D30FC3872DC@gmail.com> <CAPDqMeoLPSGbFg_H-_yOPBguXhOmx8fXjzYd_ax1Qds56KibZQ@mail.gmail.com>
From: Lorenzo Colitti <lorenzo@google.com>
Date: Tue, 06 Feb 2018 15:34:00 +0900
Message-ID: <CAKD1Yr2HQCt0DZ62_YqC1qOb_GJkqh35U8_mViMNYps8VOcv6A@mail.gmail.com>
To: Tom Herbert <tom@quantonium.net>
Cc: Dino Farinacci <farinacci@gmail.com>, Tom Herbert <tom@herbertland.com>, 5GANGIP <5gangip@ietf.org>, Behcet Sarikaya <sarikaya@ieee.org>, ila@ietf.org, Alexandre Petrescu <alexandre.petrescu@gmail.com>
Content-Type: multipart/alternative; boundary="94eb2c071dbe71e2840564855efe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/OtrgEi3gau9mcvHaF952VdV1vpQ>
Subject: Re: [Ila] [5gangip] Scaling mapping systems (was Re: BOF Description)
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2018 06:34:26 -0000

On Tue, Feb 6, 2018 at 12:37 AM, Tom Herbert <tom@quantonium.net> wrote:

> As time has gone on with experience in deployment, forwarding to another
>> node that has a large shared cache, like an RTR, seems to deal with the
>> issue in a compromised way.
>>
>
> In ILAMP (https://tools.ietf.org/html/draft-herbert-ila-ilamp-00) secure
> redirects are defined to be the primary means of populating a cache. On a
> cache miss, a packet is forwarded into the network and routing should
> forward the packet to an ILA router that contains the complete set of
> mappings for the associated shard. The router performs the transformation
> and can send a redirect back to the caching node. The redirect can be
> cached so that subsequent packets take a direct route and avoid the
> trianglular routing. Redirects must be secure so that they cannot be
> spoofed, so for that reason (and some others) the protocol is over TCP. The
> mapping cache is only an optimization and packets are never dropped or
> queued for pending cache resolution. If the cache weren't present,
> communications would still be viable but sub-optimal; that characteristic
> establishes a bound for the worst case DOS attack.
>
> Any thoughs on this approach?
>

The obvious ones would seem:

   - Will the working set of cache mappins fit in whatever memory is
   available in, say, a large peering router? Remember that memory that is
   capable of sustaining routing lookups at tens of gigabits per second is
   extremely expensive.
   - How do you defend against state exhaustion attacks whereby a large
   number of spoofed sources send packets to nonexistent destinations?
   - How much bandwidth will be used for the redirects? How much CPU time
   will be used to process them?
   - How many servers are needed to store

Suggest gaming this out for a large mobile operator with, say, 100M
clients, 100 Internet connection points and 10T of traffic.