[Softwires] ISP CGN logging inc. Destination ??

"Rajiv Asati (rajiva)" <rajiva@cisco.com> Thu, 03 May 2018 21:50 UTC

Return-Path: <rajiva@cisco.com>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F39C12EB0F; Thu, 3 May 2018 14:50:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level:
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q7NP5RI7kWU6; Thu, 3 May 2018 14:50:21 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF50912EAFB; Thu, 3 May 2018 14:50:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9096; q=dns/txt; s=iport; t=1525384220; x=1526593820; h=from:to:cc:subject:date:message-id:mime-version; bh=rA9hwoGa7mC4NwlteB/+roYXICYRGw5qGthdwR5dTFk=; b=lz5Hk6Ez9niX36D0OIUYyEJdU+F3m9C6hm7N7Qn42krWOwKHq3vd3Hpg V70U5Pghg+cpQQLuMTcpFU7bSvdIQAteCzdT7KDZaiIXLb9ZztyuBUh8l kke50FNLha77eS8tPhqRNVYvqXyhZ5+DFpoKNK98fvdFayaE8XBVGYA9A c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AVAQDAguta/51dJa1cGQEBAQEBAQEBAQEBAQcBAQEBAYJNdmEXYzKDY4gCjG+BPRqBMI4qhHEUgWQLJYRHHIIWITQYAQIBAQEBAQECbBwMhVJWEgFKAgQwJwQBDSCEEGQPqBiBIIIchFiDboI9BYglgVQ/gTIMhW0BAQOBICeDFjCCJAKYGggChWKIaIxZiUCGWwIREwGBJAEcOIFScBVlAYIZiF+CMIU+kFCBGAEB
X-IronPort-AV: E=Sophos;i="5.49,360,1520899200"; d="scan'208,217";a="108559748"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 May 2018 21:50:19 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id w43LoI8d004715 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 3 May 2018 21:50:19 GMT
Received: from xch-aln-005.cisco.com (173.36.7.15) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 3 May 2018 16:50:18 -0500
Received: from xch-aln-005.cisco.com ([173.36.7.15]) by XCH-ALN-005.cisco.com ([173.36.7.15]) with mapi id 15.00.1320.000; Thu, 3 May 2018 16:50:18 -0500
From: "Rajiv Asati (rajiva)" <rajiva@cisco.com>
To: Softwires-wg list <softwires@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>
CC: "Ramesh.R.Chandra@ril.com" <Ramesh.R.Chandra@ril.com>
Thread-Topic: ISP CGN logging inc. Destination ??
Thread-Index: AQHT4yi6QsPwS4mEj0Wx5sa9RJtTQQ==
Date: Thu, 03 May 2018 21:50:18 +0000
Message-ID: <56C7D96E-182F-4584-B190-DCD17957C01F@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.c.0.180410
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.150.44.146]
Content-Type: multipart/alternative; boundary="_000_56C7D96E182F4584B190DCD17957C01Fciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/softwires/Jl1nSO5Lwjo8zq3cPyDWBJW6g-o>
Subject: [Softwires] ISP CGN logging inc. Destination ??
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/softwires/>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 May 2018 21:50:25 -0000

Is there an RFC (besides 6269) that encourages / discourages CGN logging of destination IP+Port if source IP+port is already logged?

RFC6269 does mention the below, as compared to the server side logging of source IP+port -

// logging the destination address on the NAT is inferior
   to logging the source port at the server.
https://tools.ietf.org/html/rfc6269
//

(BTW, having both source+destination in the NAT log implicitly means no bulk allocation of source ports possible)

Separately, this prohibits using stateless NAT based solutions such as MAP or using deterministic NAT, since there is no logging in such solutions. If such a guideline was also mandated for native IPv6, then it would pose an interesting deployment issue.

--
Cheers,
Rajiv Asati
Distinguished Engineer, Cisco

PS: Few may be aware of Govt. of India’s mandate* to log both source and destination IP+port pair.
Click on “Parameter to be stored in SYS Log of Network Address Translation (NAT) for Internet Access” on this page - https://www.corestack.io/blog/the-log-mandate-enabling-indian-isps-to-adhere-to-dot-compliance-rules/

PS:
https://tools.ietf.org/html/rfc6302
https://tools.ietf.org/html/rfc7422


Session and service continuity