Network Working GroupInternet Engineering Task Force (IETF) V. FullerInternet-DraftRequest for Comments: 6833 Category: Experimental D. FarinacciIntended status: Experimental ciscoISSN: 2070-1721 Cisco SystemsExpires: September 5, 2012 March 4, 2012 LISP Map ServerJanuary 2013 Locator/ID Separation Protocol (LISP) Map-Server Interfacedraft-ietf-lisp-ms-16.txtAbstract Thisdraftdocument describes theMapingMapping Service for theLocator IdentifierLocator/ID Separation Protocol (LISP), implemented by two new types of LISP- speakingdevices,devices -- the LISPMap ResolverMap-Resolver and LISPMap Server,Map-Server -- that provides a simplified "front end"tofor one or more Endpoint ID to Routing Locator mapping databases. By using this service interface and communicating withMap ResolversMap-Resolvers andMap Servers,Map-Servers, LISP Ingress Tunnel Routers and Egress TunnelRouters,Routers are not dependent on the details of mapping database systems, which facilitates experimentation with different database designs. Since these devices implement the "edge" of the LISP infrastructure, connect directly to LISP-capable Internet end sites, and comprise the bulk of LISP-speaking devices, reducing their implementation and operational complexity should also reduce the overall cost and effort of deploying LISP. Status ofthisThis Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78not an Internet Standards Track specification; it is published for examination, experimental implementation, andBCP 79. Internet-Drafts are working documentsevaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are amaximumcandidate for any level of Internet Standard; see Section 2 ofsix monthsRFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 5, 2012.http://www.rfc-editor.org/info/rfc6833. Copyright Notice Copyright (c)20122013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 3....................................................2 2. Definition of Terms. . . . . . . . . . . . . . . . . . . . . 4.............................................3 3. Basic Overview. . . . . . . . . . . . . . . . . . . . . . . . 5..................................................4 4. InteractionsWithwith Other LISP Components. . . . . . . . . . . 6.........................5 4.1. ITR EID-to-RLOC Mapping Resolution. . . . . . . . . . . . 6.........................5 4.2.EID PrefixEID-Prefix Configuration and ETR Registration. . . . . . 7..............6 4.3.Map ServerMap-Server Processing. . . . . . . . . . . . . . . . . . 8......................................8 4.4.Map ResolverMap-Resolver Processing. . . . . . . . . . . . . . . . . 9....................................9 4.4.1. AnycastMap ResolverMap-Resolver Operation. . . . . . . . . . . . 10.....................10 5. Open Issues and Considerations. . . . . . . . . . . . . . . . 11.................................10 6.IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 7.Security Considerations. . . . . . . . . . . . . . . . . . . 13 8.........................................11 7. References. . . . . . . . . . . . . . . . . . . . . . . . . . 14 8.1......................................................12 7.1. Normative References. . . . . . . . . . . . . . . . . . . 14 8.2.......................................12 7.2. Informative References. . . . . . . . . . . . . . . . . . 14....................................12 Appendix A. Acknowledgments. . . . . . . . . . . . . . . . . . . 15 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16.......................................13 1. Introduction[LISP], the Locator IdentifierThe Locator/ID SeparationProtocol,Protocol [RFC6830] specifies an architecture and mechanism for replacing the addresses currently used by IP with two separate name spaces: Endpoint IDs (EIDs), used withinsites,sites; and Routing Locators (RLOCs), used on the transit networks that make up the Internet infrastructure. To achieve this separation, LISP defines protocol mechanisms for mapping from EIDs to RLOCs. In addition, LISP assumes the existence of a database to store and propagate those mappings globally. Several such databases have beenproposed,proposed; amongthem: LISP-CONS [CONS], LISP-NERD, [NERD]them are the Content distribution Overlay Network Service for LISP (LISP-CONS) [LISP-CONS], LISP-NERD (a Not-so-novel EID-to-RLOC Database) [RFC6837], andLISP+ALT [ALT].LISP Alternative Logical Topology (LISP+ALT) [RFC6836]. The LISP Mapping Service defines two new types of LISP-speaking devices: theMap Resolver,Map-Resolver, which accepts Map-Requests from an Ingress Tunnel Router (ITR) and "resolves" the EID-to-RLOC mapping using a mappingdatabase,database; and theMap Server,Map-Server, which learns authoritativeEID- to-RLOCEID-to-RLOC mappings from an Egress Tunnel Router (ETR) and publishes them in a database. Conceptually, LISPMap ServersMap-Servers share some of the same basic configuration and maintenance properties as Domain Name System (DNS) [RFC1035] servers; likewise,Map ResolversMap-Resolvers are conceptually similar to DNS caching resolvers. With this in mind, this specification borrows familiar terminology (resolver and server) from the DNS specifications. Note that while this document assumes a LISP+ALT database mapping infrastructure to illustrate certain aspects ofMap ServerMap-Server andMap ResolverMap-Resolver operation, the Mapping Service interface can (and likely will) be used by ITRs and ETRs to access other mapping database systems as the LISP infrastructure evolves. Section 5 of this document notes a number of issues with theMap ServerMap-Server andMap ResolverMap-Resolver design that are not yet completely understood and are subjects of further experimentation. The LISP Mapping Service is an important component of the LISP toolset. Issues and concerns about the deployment of LISP for Internet traffic are discussed in[LISP].[RFC6830]. 2. Definition of TermsMap Server: aMap-Server: A network infrastructure componentwhichthat learns ofEID- prefixEID-Prefix mapping entries from an ETR, via the registration mechanism described below, or some other authoritative source if one exists. AMap ServerMap-Server publishes theseEID-prefixesEID-Prefixes in a mapping database.Map Resolver: aMap-Resolver: A network infrastructure componentwhichthat accepts LISP Encapsulated Map-Requests, typically from an ITR, and determines whether or not the destination IP address is part of the EID namespace; if it is not, a Negative Map-Reply is returned. Otherwise, theMap ResolverMap-Resolver finds the appropriate EID-to-RLOC mapping by consulting a mapping database system. Encapsulated Map-Request:aA LISP Map-Request carried within an Encapsulated Control Message, which has an additional LISP header prepended. Sent to UDP destination port 4342. The "outer" addresses areglobally-routeableglobally routable IP addresses, also known as RLOCs. Used by an ITR when sending to aMap ResolverMap-Resolver and by aMap ServerMap-Server when forwarding a Map-Request to an ETR. Negative Map-Reply:aA LISP Map-Reply that contains an emptylocator-set.Locator-Set. Returned in response to a Map-Request if the destination EID does not exist in the mapping database. Typically, this means that the "EID" being requested is an IP address connected to a non-LISP site. Map-Register message:aA LISP message sent by an ETR to aMap ServerMap-Server to register its associatedEID-prefixes.EID-Prefixes. In addition to the set ofEID-prefixesEID-Prefixes to register, the message includes one or more RLOCs to bebeused by theMap ServerMap-Server when forwarding Map-Requests (re-formatted as Encapsulated Map-Requests) received through the database mapping system. An ETR may request that theMap ServerMap-Server answer Map-Requests on its behalf by setting the"proxy-map-reply""proxy Map-Reply" flag (P-bit) in the message. Map-Notify message:aA LISP message sent by aMap ServerMap-Server to an ETR to confirm that a Map-Register has been received and processed. An ETR requests that a Map-Notify be returned by setting the "want-map-notify"or "M" bitflag (M-bit) in the Map-Register message. Unlike a Map-Reply, a Map-Notify uses UDP port 4342 for both source and destination. For definitions of otherterms,terms -- notably Map-Request, Map-Reply, Ingress Tunnel Router (ITR), and Egress Tunnel Router(ETR),(ETR) -- please consult the LISP specification[LISP].[RFC6830]. 3. Basic Overview AMap ServerMap-Server is a devicewhichthat publishesEID-prefixesEID-Prefixes in a LISP mapping database on behalf of a set of ETRs. When it receives a Map Request (typically from anITR)ITR), it consults the mapping database to find an ETR that can answer with the set of RLOCs for anEID-prefix.EID-Prefix. To publish itsEID-prefixes,EID-Prefixes, an ETR periodically sends Map-Register messages to theMap Server.Map-Server. A Map-Register message contains a list ofEID-prefixesEID-Prefixes plus a set of RLOCs that can be used to reach the ETR when aMap ServerMap-Server needs to forward a Map-Request to it. When LISP+ALT is used as the mapping database, aMap ServerMap-Server connects to the ALT network and acts as a "last-hop"ALT router.ALT-Router. IntermediateALT routersALT-Routers forward Map-Requests to theMap ServerMap-Server that advertises a particularEID-prefixEID-Prefix, and theMap ServerMap-Server forwards them to the owning ETR, which responds with Map-Reply messages. AMap ResolverMap-Resolver receives Encapsulated Map-Requests from its client ITRs and uses a mapping database system to find the appropriate ETR to answer those requests. On a LISP+ALT network, aMap ResolverMap-Resolver acts as a "first-hop"ALT router.ALT-Router. It hasGREGeneric Routing Encapsulation (GRE) tunnels configured to otherALT routersALT-Routers and uses BGP to learn paths to ETRs for different prefixes in the LISP+ALT database. TheMap ResolverMap-Resolver uses this path information to forward Map-Requests over the ALT to the correct ETRs. Note that while it is conceivable that aMap ResolverMap-Resolver could cache responses to improve performance, issues surrounding cache management will need to be resolvedforso that doing sotowill be reliable and practical. As initially deployed,Map ResolversMap-Resolvers will operate only in anon- cachingnon-caching mode,de-decapsulatingdecapsulating and forwarding Encapsulated Map Requests received from ITRs. Any specification of caching functionality is left for future work. Note that a single device can implement the functions of both aMap ServerMap-Server and aMap Resolver and,Map-Resolver, and in manycases,cases the functions will be co-located in that way. Detailed descriptions of the LISP packet types referenced by this document may be found in[LISP].[RFC6830]. 4. InteractionsWithwith Other LISP Components 4.1. ITR EID-to-RLOC Mapping Resolution An ITR is configured with one or moreMap ResolverMap-Resolver addresses. These addresses are"locators""Locators" (or RLOCs) and must berouteableroutable on the underlying core network; they must not need to be resolved through LISP EID-to-RLOCmappingmapping, as that would introduce a circular dependency. When using aMap Resolver,Map-Resolver, an ITR does not need to connect to any other database mapping system. In particular, the ITR need not connect to the LISP+ALT infrastructure or implement the BGP and GRE protocols that it uses. An ITR sends an Encapsulated Map-Request to a configuredMap ResolverMap-Resolver when it needs an EID-to-RLOC mapping that is not found in its local map-cache. Using theMap ResolverMap-Resolver greatly reduces both the complexity of the ITR implementation and the costs associated with its operation. In response to an Encapsulated Map-Request, the ITR can expect one of the following: o An immediate Negative Map-Reply (with action code of"forward- native","Natively-Forward", 15-minuteTTL)Time to Live (TTL)) from theMap ResolverMap-Resolver if theMap ResolverMap-Resolver can determine that the requested EID does not exist. The ITR saves theEID-prefixEID-Prefix returned in the Map-Reply in its cache,markingmarks it asnon-LISP-capablenon-LISP-capable, and knows not to attempt LISP encapsulation for destinations matching it. o A NegativeMap-Reply (withMap-Reply, with action code of"forward-native")"Natively-Forward", fromthe Map Servera Map-Server thathasis authoritative for anaggregate EID-coveringEID-Prefix that matches the requested EIDin the Map-Requestbutwherethat does not have an actively registered, more-specific ID-prefix. In this case, the requested EIDmatchesis said to match a "hole" in theaggregate. If the "hole" is forauthoritative EID-Prefix. If the requested EID matches aLISP EID-prefixmore-specific EID-Prefix thatis defined inhas been delegated by theMap Server configurationMap-Server but for which no ETRs are currently registered, a 1-minute TTL is returned. If the"hole" is for an unassignedrequested EID matches a non-delegated part of theaggregate,authoritative EID-Prefix, then it is not a LISP EID and a 15-minute TTL is returned. See Section 4.2 for discussion of aggregateEID-prefixesEID-Prefixes and details ofMap Server EID-prefixMap-Server EID-Prefix matching. o A LISP Map-Reply from the ETR that owns the EID-to-RLOC mapping or possibly from aMap ServerMap-Server answering on behalf of the ETR. See(Section 4.4)Section 4.4 for more details onMap ResolverMap-Resolver message processing. Note that an ITR may be configured to both use aMap ResolverMap-Resolver and to participate in a LISP+ALT logical network. In such a situation, the ITR should send Map-Requests through the ALT network for anyEID- prefixEID-Prefix learned via ALT BGP. Such a configuration is expected to be very rare, since there is little benefit to using aMap ResolverMap-Resolver if an ITR is already using LISP+ALT. There would be, for example, no need for such an ITR to send a Map-Request to a possibly non-existent EID (and rely on Negative Map-Replies) if it can consult the ALT database to verify that anEID-prefixEID-Prefix is present before sending that Map-Request. 4.2.EID PrefixEID-Prefix Configuration and ETR Registration An ETR publishes itsEID-prefixesEID-Prefixes on aMap ServerMap-Server by sending LISP Map-Register messages. A Map-Register message includes authentication data, so prior to sending a Map-Register message, the ETR andMap ServerMap-Server must be configured with a shared secret or other relevant authentication information. AMap Server'sMap-Server's configuration must also include a list of theEID-prefixesEID-Prefixes for which each ETR is authoritative. Upon receipt of a Map-Register from an ETR, aMap ServerMap-Server accepts onlyEID-prefixesEID-Prefixes that are configured for that ETR. Failure to implement such a check would leave the mapping system vulnerable to trivialEID-prefixEID-Prefix hijacking attacks. As developers and operators gain experience with the mapping system, additional, stronger security measures may be added to the registration process. In addition to the set ofEID-prefixesEID-Prefixes defined for each ETR that may register, aMap ServerMap-Server is typically also configured with one or more aggregate prefixes that define the part of the EID numbering space assigned to it. When LISP+ALT is the database in use, aggregateEID- prefixesEID-Prefixes are implemented as discard routes and advertised into ALT BGP. Theexistanceexistence of aggregateEID-prefixesEID-Prefixes in aMap Server'sMap-Server's database means that it may receive Map Requests forEID-prefixesEID-Prefixes that match an aggregate but do not match a registered prefix; Section 4.3 describes how this is handled. Map-Register messages are sent periodically from an ETR to aMap ServerMap-Server with a suggested interval between messages of one minute. AMap ServerMap-Server shouldtime-outtime out and remove an ETR's registration if it has not received a valid Map-Register message within the past three minutes. When first contacting aMap ServerMap-Server after restart or changes to its EID-to-RLOC database mappings, an ETR may initially sendMap- RegisterMap-Register messages at an increased frequency, up to one every 20 seconds. This "quick registration" period is limited to five minutes in duration. An ETR may request that aMap ServerMap-Server explicitly acknowledge receipt and processing of a Map-Register message by setting the"want-map- notify" ("M" bit)"want-map-notify" (M-bit) flag. AMap ServerMap-Server that receives a Map-Register with this flag set will respond with a Map-Notify message. Typical use of this flag by an ETR would be to set it for Map-Register messages sent during the initial "quick registration" with aMap ServerMap-Server but then set it only occasionally during steady-state maintenance of its association with thatMap Server.Map-Server. Note that the Map-Notify message is sent to UDP destination port 4342, not to the source port specified in the original Map-Register message. Note that a one-minute minimum registration interval during maintenance of anETR-MSETR-Map-Server association places alower-boundlower bound on how quickly and how frequently a mapping database entry can be updated. This may have implications for what sorts of mobility can be supported directly by the mapping system; shorter registration intervals or other mechanisms might be needed tosuopportsupport faster mobility in some cases. For a discussion on one way that faster mobility may be implemented for individual devices, please see [LISP-MN]. An ETR may also request, by setting the"proxy-map-reply""proxy Map-Reply" flag (P-bit) in the Map-Register message, that aMap ServerMap-Server answerMap- RequestsMap-Requests instead of forwarding them to the ETR. See[LISP][RFC6830] for details on how theMap ServerMap-Server sets certain flags (such as those indicating whether the message is authoritative and how returnedlocatorsLocators should be treated) when sending a Map-Reply on behalf of an ETR. When an ETR requests proxy reply service, it should include all RLOCs for all ETRs for theEID-prefixEID-Prefix being registered, along with the routable flag ("R-bit") setting for each RLOC. TheMap ServerMap-Server includes all of this information inMap ReplyMap-Reply messages that it sends on behalf of the ETR. This differs from a non-proxyregistrationregistration, since the latter need only provide one or more RLOCs for aMap ServerMap-Server to use for forwarding Map-Requests; the registration information is not used inMap-RepliesMap-Replies, so it being incomplete is not incorrect. An ETRwhichthat uses aMap ServerMap-Server to publish its EID-to-RLOC mappings does not need to participate further in the mapping database protocol(s). When using a LISP+ALT mapping database, for example, this means that the ETR does not need to implement GRE or BGP, which greatly simplifies its configuration and reduces its cost of operation. Note that use of aMap ServerMap-Server does not preclude an ETR from also connecting to the mapping database(i.e.(i.e., it could also connect to the LISP+ALTnetwork)network), but doing so doesn't seem particularlyusefuluseful, as the whole purpose of using aMap ServerMap-Server is to avoid the complexity of the mapping database protocols. 4.3.Map ServerMap-Server Processing Once aMap ServerMap-Server hasEID-prefixesEID-Prefixes registered by its client ETRs, it can accept and process Map-Requests for them. In response to a Map-Request (received over the ALT if LISP+ALT is in use), theMap ServerMap-Server first checks to see if the destination EID matches a configuredEID-prefix.EID-Prefix. If there is no match, theMap ServerMap-Server returns anegativeNegative Map-Reply with action code"forward-native""Natively-Forward" and a 15-minute TTL. This may occur if a Map Request is received for a configuredaggreate EID-prefixaggregate EID-Prefix for which no more-specificEID- prefixEID-Prefix exists; it indicates the presence of a non-LISP "hole" in theagregate EID-prefix.aggregate EID-Prefix. Next, theMap ServerMap-Server checks to see if any ETRs have registered the matchingEID-prefix.EID-Prefix. If none are found, then theMap ServerMap-Server returns anegativeNegative Map-Reply with action code"forward-native""Natively-Forward" and a 1-minute TTL. If any of the registered ETRs for theEID-prefixEID-Prefix have requested proxy reply service, then theMap ServerMap-Server answers the request instead of forwarding it. It returns a Map-Reply with theEID-prefix,EID-Prefix, RLOCs, and other information learned through the registration process. If none of the ETRs have requested proxy reply service, then theMap ServerMap-Server re-encapsulates and forwards the resulting EncapsulatedMap- RequestMap-Request to one of the registered ETRs. It does not otherwise alter theMap-RequestMap-Request, so any Map-Reply sent by the ETR is returned to the RLOC in the Map-Request, not to theMap Server.Map-Server. Unless also acting as aMap Resolver,Map-Resolver, aMap ServerMap-Server should never receive Map-Replies; any such messages should be discarded without response, perhaps accompanied by the logging of a diagnostic message if the rate ofMap- RepliesMap-Replies is suggestive of malicious traffic. 4.4.Map ResolverMap-Resolver Processing Upon receipt of an Encapsulated Map-Request, aMap Resolver de- capsulatesMap-Resolver decapsulates the enclosed message and then searches for the requested EID in its local database of mapping entries (statically configured or learned from associated ETRs if theMap ResolverMap-Resolver is also aMap ServerMap-Server offering proxy reply service). If it finds a matching entry, it returns a LISP Map-Reply with the known mapping. If theMap ResolverMap-Resolver does not have the mapping entry and if it can determine that the EID is not in the mapping database (for example, if LISP+ALT is used, theMap ResolverMap-Resolver will have an ALT forwarding table that covers the full EIDspace)space), it immediately returns a negative LISP Map-Reply, with action code"forward-native""Natively-Forward" and a15- minute15-minute TTL. To minimize the number of negative cache entries needed by an ITR, theMap ResolverMap-Resolver should return the least-specific prefixwhichthat both matches the original query and does not match anyEID- prefixEID-Prefix known to exist in the LISP-capable infrastructure. If theMap ResolverMap-Resolver does not have sufficient information to know whether the EID exists, it needs to forward the Map-Request to another devicewhichthat has more information about the EID being requested. To do this, it forwards the unencapsulated Map-Request, with the original ITR RLOC as the source, to the mapping database system. Using LISP+ALT, theMap ResolverMap-Resolver is connected to the ALT network and sends the Map-Request to the next ALT hop learned from its ALT BGP neighbors. TheMap ResolverMap-Resolver does not send any response to the ITR; since the source RLOC is that of the ITR, the ETR orMap Server whichMap-Server that receives the Map-Request over the ALT and responds will do so directly to the ITR. 4.4.1. AnycastMap ResolverMap-Resolver Operation AMap ResolverMap-Resolver can be set up to use "anycast", where the same address is assigned to multipleMap ResolversMap-Resolvers and is propagated through IGP routing, to facilitate the use of atopologically-close Map Resolvertopologically close Map-Resolver by each ITR. Note thatMap ServerMap-Server associations with ETRs should not use anycastaddressesaddresses, as registrations need to be established between an ETR and a specific set ofMap Servers,Map-Servers, each identified by a specificregistationregistration association. 5. Open Issues and Considerations There are a number of issues with theMap ServerMap-Server andMap ResolverMap-Resolver design that are not yet completely understood. Among these are: o Constants, such as those used for Map-Register frequency, retransmission timeouts, retransmission limits,negativeNegative Map-Reply TTLs, etalal. are subject to further refinement as more experience with prototype deployment is gained. o Convergence time when an EID-to-RLOC mappingchangeschanges, and mechanisms for detecting and refreshing or removing stale, cachedinformationinformation. o Deployability and complexitytrade-offstradeoffs of implementing stronger security measures in bothEID-prefixEID-Prefix registration and Map-Request/ Map-Replyprocessingprocessing. o Requirements for additional state in the registration process betweenMap ServersMap-Servers andETRsETRs. A discussion of other issues surrounding LISP deployment may also be found in Section 15 of[LISP].[RFC6830]. The authors expect that experimentation on the LISP pilot network will help answer open questions surrounding these and other issues. 6.IANA Considerations This document makes no request of the IANA. 7.Security Considerations The 2-way LISP header nonce exchange documented in[LISP][RFC6830] can be used to avoid ITR spoofing attacks. To publish an authoritative EID-to-RLOC mapping with aMap Server,Map-Server, an ETR includes authentication data that is a hash of the message using a pair-wise shared key. An implementation must support use ofHMAC- SHA-1-96HMAC-SHA-1-96 [RFC2104] and should support use of HMAC-SHA-256-128 [RFC6234] (SHA-256 truncated to 128 bits). During experimental and prototype deployment, all authentication key configuration will be manual. Should LISP and its components be considered for IETF standardization, further work will be required to follow the BCP 107 [RFC4107] recommendations on automated key management. As noted in Section 4.2, aMap ServerMap-Server should verify that allEID- prefixesEID-Prefixes registered by an ETR match the configuration stored on theMap Server.Map-Server. Thecurrently-definedcurrently defined authentication mechanism for Map-Register messages does not provide protection against "replay" attacks by a "man-in-the-middle". Additional work is needed in this area. [LISP-SEC] defines a proposed mechanism for providing origin authentication, integrity, anti-replay protection, and prevention of man-in-the-middle and "overclaiming" attacks on the Map-Request/ Map-Reply exchange. Work is ongoing on this and other proposals for resolving these open securityissuesissues. While beyond the scope of securing an individualMap ServerMap-Server orMap Resolver,Map-Resolver, it should be noted that a BGP-based LISP+ALT network (if ALT is used as the mapping database infrastructure) can take advantage of standards work on adding security to BGP.8.7. References8.1.7.1. Normative References[ALT] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "LISP Alternative Topology (LISP-ALT)", draft-ietf-lisp-alt-10.txt (work in progress), December 2011. [LISP] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "Locator/ID Separation Protocol (LISP)", draft-ietf-lisp-22.txt (work in progress), February 2012.[RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- Hashing for Message Authentication", RFC 2104, February 1997. [RFC6234] Eastlake, D. and T. Hansen, "US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)", RFC 6234, May 2011.8.2.[RFC6830] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "The Locator/ID Separation Protocol (LISP)", RFC 6830, January 2013. [RFC6836] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)", RFC 6836, January 2013. 7.2. Informative References[CONS][LISP-CONS] Brim, S., Chiappa, N., Farinacci, D., Fuller, V., Lewis, D., and D. Meyer, "LISP-CONS: A Content distribution Overlay Network Service for LISP",draft-meyer-lisp-cons-04.txt (workWork inprogress),Progress, April 2008. [LISP-MN] Farinacci, D., Lewis, D., Meyer, D., and C. White, "LISP MobileNode Architecture", draft-meyer-lisp-mn-06.txt (workNode", Work inprogress),Progress, October2011.2012. [LISP-SEC] Maino, F., Ermagan, V., Cabellos, A.,Sanchez,Saucez, D., and O. Bonaventure,"LISP-Security", draft-ietf-lisp-sec-01.txt (work"LISP-Security (LISP-SEC)", Work inprogress), JanuaryProgress, October 2012.[NERD] Lear, E., "NERD: A Not-so-novel EID to RLOC Database", draft-lear-lisp-nerd-08.txt (work in progress), March 2010.[RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic Key Management", BCP 107, RFC 4107, June 2005. [RFC6837] Lear, E., "NERD: A Not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database", RFC 6837, January 2013. Appendix A. Acknowledgments The authors would like to thankGregGregg Schudel, Darrel Lewis, John Zwiebel, Andrew Partan, Dave Meyer, Isidor Kouvelas, Jesper Skriver, Fabio Maino, and members of the lisp@ietf.org mailing list for their feedback and helpful suggestions. Special thanks are due to Noel Chiappa for his extensive work on caching with LISP-CONS, some of which may be used byMap Resolvers.Map-Resolvers. Authors' Addresses Vince Fullercisco Systems Tasman Drive San Jose, CA 95134 USA Email: vaf@cisco.comEMail: vaf@vaf.net Dino FarinacciciscoCisco Systems Tasman Drive San Jose, CA 95134 USAEmail: dino@cisco.comEMail: farinacci@gmail.com