Network Working GroupInternet Engineering Task Force (IETF) V. FullerInternet-DraftRequest for Comments: 6836 Category: Experimental D. FarinacciIntended status: ExperimentalISSN: 2070-1721 D. MeyerExpires: June 3, 2013D. Lewis CiscoNovember 30, 2012 LISPSystems January 2013 Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)draft-ietf-lisp-alt-10.txtAbstract This document describes a simple distributed index system to be used by a Locator/ID Separation Protocol (LISP) Ingress Tunnel Router (ITR) orMap ResolverMap-Resolver (MR) to find the Egress Tunnel Router (ETR)whichthat holds the mapping information for a particular Endpoint Identifier (EID). The MR can then query that ETR to obtain the actual mapping information, which consists of a list of Routing Locators (RLOCs) for the EID. Termed the Alternative Logical Topology (ALT), the index is built as an overlay network on the public Internet using the Border Gateway Protocol (BGP) andtheGeneric Routing Encapsulation (GRE). Status ofthisThis Memo ThisInternet-Draftdocument issubmitted in full conformance with the provisions of BCP 78not an Internet Standards Track specification; it is published for examination, experimental implementation, andBCP 79. Internet-Drafts are working documentsevaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are amaximumcandidate for any level ofsix monthsInternet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on June 3, 2013.http://www.rfc-editor.org/info/rfc6836. Copyright Notice Copyright (c)20122013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 4....................................................3 2. Definition of Terms. . . . . . . . . . . . . . . . . . . . . 6.............................................5 3. TheLISP+ALT model . . . . . . . . . . . . . . . . . . . . . . 9LISP-ALT Model ..............................................8 3.1.RouteabilityRoutability of EIDs. . . . . . . . . . . . . . . . . . . 9........................................8 3.1.1. Mechanisms for an ETR tooriginate EID-prefixes . . . 10Originate EID-Prefixes .....9 3.1.2. Mechanisms for an ITR toforwardForward toEID-prefixes . . . 10EID-Prefixes ....9 3.1.3.Map ServerMap-Server Modelpreferred . . . . . . . . . . . . . . 10Preferred ..........................9 3.2. Connectivity tonon-LISP sites . . . . . . . . . . . . . . 10Non-LISP Sites ............................10 3.3. Caveats on theuseUse ofData Probes . . . . . . . . . . . . 11Data-Probes .........................10 4. LISP+ALT: Overview. . . . . . . . . . . . . . . . . . . . . . 12.............................................10 4.1. ITRtraffic handling . . . . . . . . . . . . . . . . . . . 13Traffic Handling ......................................11 4.2. EID Assignment - Hierarchy and Topology. . . . . . . . . 14...................12 4.3. Use of GRE and BGP betweenLISP+ALTLISP-ALT Routers. . . . . . . 15...............14 5.EID-prefixEID-Prefix Propagation and Map-Request Forwarding. . . . . . 16..............14 5.1. Changes to ITRbehaviorBehavior with LISP+ALT. . . . . . . . . . 16.....................15 5.2. Changes to ETRbehaviorBehavior with LISP+ALT. . . . . . . . . . 17.....................15 5.3. ALT Datagramforwarding falure . . . . . . . . . . . . . . 17Forwarding Failure ...........................16 6. BGPconfigurationConfiguration andprotocol considerations . . . . . . . . 19Protocol Considerations ..................16 6.1. Autonomous System Numbers (ASNs) in LISP+ALT. . . . . . . 19..............16 6.2.Sub-AddressSubsequent Address Family Identifier (SAFI) for LISP+ALT. . . . 19..17 7.EID-prefixEID-Prefix Aggregation. . . . . . . . . . . . . . . . . . . . 20.........................................17 7.1. Stability of the ALT. . . . . . . . . . . . . . . . . . . 20......................................18 7.2. Trafficengineering usingEngineering Using LISP. . . . . . . . . . . . . . 20............................18 7.3. EdgeaggregationAggregation anddampening . . . . . . . . . . . . . . 21Dampening ............................19 7.4. EIDassignment flexibilityAssignment Flexibility vs. ALTscaling . . . . . . . . 21Scaling ................19 8. ConnectingsitesSites to the ALTnetwork . . . . . . . . . . . . . 23Network ............................20 8.1. ETRsoriginating informationOriginating Information into the ALT. . . . . . . . 23.................20 8.2. ITRs Using the ALT. . . . . . . . . . . . . . . . . . . . 23........................................21 9.IANA Considerations . . . . . . . . . . . . . . . . . . . . . 25 10.Security Considerations. . . . . . . . . . . . . . . . . . . 26 10.1.........................................22 9.1. Apparent LISP+ALT Vulnerabilities. . . . . . . . . . . . 26 10.2..........................22 9.2. Survey of LISP+ALT Security Mechanisms. . . . . . . . . . 27 10.3.....................23 9.3. Use ofnew IETF standardAdditional BGP Securitymechanisms . . . . . 27 11.Mechanisms .................24 10. Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . 28 12................................................24 11. References. . . . . . . . . . . . . . . . . . . . . . . . . . 29 12.1.....................................................24 11.1. Normative References. . . . . . . . . . . . . . . . . . . 29 12.2......................................24 11.2. Informative References. . . . . . . . . . . . . . . . . . 29 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 30...................................25 1. Introduction This document describes the LISP+ALT system, used bya [LISP] ITRan [RFC6830] Ingress Tunnel Router (ITR) or MR to find theETREgress Tunnel Router (ETR) that holds the RLOC mapping information for a particularEID.Endpoint Identifier (EID). The ALT network is built using the Border Gateway Protocol(BGP, [RFC4271]), the(BGP) [RFC4271], BGPmulti-protocol extensionmultiprotocol extensions [RFC4760], andtheGeneric Routing Encapsulation(GRE, [RFC2784])(GRE) [RFC2784] to construct an overlay network of devices(ALT Routers) which(ALT-Routers) that operate onEID-prefixesEID-Prefixes and use EIDs as forwarding destinations.ALT RoutersALT-Routers advertisehierarchically-delegatedhierarchically delegated segments of the EID namespace (i.e., prefixes) toward the rest of the ALT; they also forward traffic destined for an EID covered by one of those prefixes toward the network element that is authoritative for that EID and is the origin of the BGP advertisement for thatEID-prefix.EID-Prefix. AnIngress Tunnel Router (ITR)ITR uses this overlay to send a LISP Map-Request (defined in[LISP])[RFC6830]) to theEgress Tunnel Router (ETR)ETR that holds the EID-to-RLOC mapping for a matchingEID-prefix.EID-Prefix. In most cases, an ITR does not connect directly to the overlay network but instead sends Map-Requests via a Map-Resolver (described in[LISP-MS]) which[RFC6833]) that does. Likewise, in most cases, an ETR does not connect directly to the overlay network but instead registers itsEID-prefixesEID-Prefixes with aMap- ServerMap-Server that advertises thoseEID-prefixesEID-Prefixes on to the ALT and forwards Map-Requests for them to the ETR. It is important to note that the ALT does not distribute actualEID- to-RLOCEID-to-RLOC mappings. What it does provide is a forwarding path from an ITR (or MR)whichthat requires an EID-to-RLOC mapping to an ETRwhichthat holds that mapping. The ITR/MR uses this path to send an ALT Datagram (see Section 3) to anETRETR, which then responds with aMap- ReplyMap-Reply containing the needed mapping information. One design goal for LISP+ALT is to use existing technology wherever possible. To this end, the ALT is intended to be built usingoff- the-shelfoff-the-shelf routerswhichthat already implement the required protocols (BGP and GRE); little, if any, LISP-specific modifications should be needed for such devices to be deployed on the ALT (see Section 7 for aggregation requirements). Note, though, that organizational and operational considerations suggest thatALT RoutersALT-Routers be both logically and physically separate from the "native" Internet packet transport system; deploying this overlay on those routerswhichthat are already participating in the global routing system and actively forwarding Internet traffic is not recommended. This specification is experimental, and there are areas where further experience is needed to understand the best implementation strategy, operational model, and effects on Internet operations. These areas include: o application effects of on-demand route map discovery o tradeoff in connection setup time vs. ALT design and performance when using a Map Request instead ofcarringcarrying initial user data in aData ProbeData-Probe o best practical ways to build ALT hierarchies o effects of route leakage from ALT to the current Internet, particularly for LISP-to-non-LISP interworking o effects of exceptional situations, such as denial-of-service (DoS) attacks Experimentation, measurements, and deployment experience on these aspects is appreciated. While these issues are conceptually well- understood(e.g.(e.g., an ALT lookup causes potential delay for the first packet destined to a given network), the real-world operational effects are much less clear. The remainder of this document is organized as follows: Section 2 provides the definitions of terms used in this document. Section 3 outlines theLISP ALTLISP-ALT model, whereEID-prefixesEID-Prefixes are advertised using BGP on an overlay network (the "ALT") and Map-Requests are forwarded across it. Section 4 provides a basic overview of the LISPAlternateAlternative Logical Topology architecture, and Section 5 describes how the ALT uses BGP to propagateEndpoint IdentifierEID reachability over the overlaynetwork andnetwork. Section 6 describes other considerations for using BGP on the ALT. Section 7 describes the construction of the ALT aggregation hierarchy, and Section 8 discusses howLISP+ALTLISP-ALT elements are connected to form the overlay network. Section 9 discusses security considerations relevant to LISP+ALT. 2. Definition of Terms This section provides high-level definitions of LISP concepts and components involved with and affected by LISP+ALT. Alternative Logical Topology (ALT): The virtual overlay network made up of tunnels betweenLISP+ALTLISP-ALT Routers. The Border Gateway Protocol (BGP) runs betweenALT RoutersALT-Routers and is used to carry reachability information forEID-prefixes.EID-Prefixes. The ALT provides a way to forward Map-Requests (and, if supported,Data Probes)Data-Probes) toward the ETR that "owns" anEID-prefix.EID-Prefix. As a tunneled overlay, its performance is expected to be quitelimitedlimited, souse ofusing it to forward high-bandwidth flows ofData ProbesData-Probes is strongly discouraged (see Section 3.3 for additional discussion).ALT Router:ALT-Router: Thedevices which rundevice that runs on the ALT. The ALT is a static network built using tunnels betweenALT Routers.ALT-Routers. These routers are deployed in aroughly-hierarchicalroughly hierarchical mesh in which routers at each level in the topology are responsible for aggregatingEID- prefixesEID-Prefixes learned from those logically "below" them and advertising summary prefixes to those logically "above" them. Prefix learning and propagation betweenALT RoutersALT-Routers is done using BGP. AnALT RouterALT-Router at the lowest level, or "edge" of the ALT, learnsEID- prefixesEID-Prefixes from its "client" ETRs. See Section 3.1 for a description of howEID-prefixesEID-Prefixes are learned at the "edge" of the ALT. See also Section 6 for details on how BGP is configured between the different network elements. When anALT RouterALT-Router receives an ALT Datagram, it looks up the destination EID in its forwarding table (composed ofEID prefixEID-Prefix routes it learned from neighboringALT Routers)ALT-Routers) and forwards it to the logicalnext-hopnext hop on the overlay network. Endpoint ID (EID): A 32-bit (for IPv4) or 128-bit (foripv6)IPv6) value used to identify the ultimate source or destination for a LISP- encapsulated packet. See[LISP][RFC6830] for details.EID-prefix:EID-Prefix: A set of EIDs delegated in a power-of-two block. Information aboutEID-prefixesEID-Prefixes is exchanged amongALT RoutersALT-Routers (not on the global Internet) usingBGPBGP, andEID-prefixesEID-Prefixes are expected to be assigned in a hierarchical manner such that they can be aggregated byALT Routers.ALT-Routers. Such a block is characterized by a prefix and a length. Note that while the ALT routing system considers anEID-prefixEID-Prefix to be an opaque block of EIDs, an end site may put site-local,topologically-relevanttopologically relevant structure (subnetting) into anEID-prefixEID-Prefix for intra-site routing. AggregatedEID-prefixes:EID-Prefixes: A set of individualEID-prefixesEID-Prefixes that have been aggregated in the [RFC4632] sense.Map ServerMap-Server (MS): An edgeALT RouterALT-Router that provides a registration function for non-ALT-connected ETRs, originatesEID-prefixesEID-Prefixes into the ALT on behalf of those ETRs, and forwards Map-Requests to them. See[LISP-MS][RFC6833] for details.Map ResolverMap-Resolver (MR): An edgeALT RouterALT-Router that accepts an Encapsulated Map-Request from a non-ALT-connected ITR, decapsulates it, and forwards it on to the ALT toward the ETRwhichthat owns the requestedEID-prefix.EID-Prefix. See[LISP-MS][RFC6833] for details. Ingress Tunnel Router (ITR): A routerwhichthat sends LISPMap- RequestsMap-Requests or encapsulates IP datagrams with LISP headers, as defined in[LISP].[RFC6830]. In this document,the term"ITR" refers to any device implementing ITR functionality, including a Proxy-ITR (see[LISP-IW]).[RFC6832]). Under some circumstances, a LISPMap ResolverMap-Resolver may also originate Map-Requests (see[LISP-MS]).[RFC6833]). Egress Tunnel Router (ETR): A routerwhichthat sends LISP Map-Replies in response to LISP Map-Requests and decapsulates LISP- encapsulated IP datagrams for delivery toend systems,end-systems, as defined in[LISP].[RFC6830]. In this document,the term"ETR" refers to any device implementing ETR functionality, including a Proxy-ETR (see[LISP-IW]).[RFC6832]). Under some circumstances, a LISPMap ServerMap-Server may also respond to Map-Requests (see[LISP-MS]).[RFC6833]). Routing Locator (RLOC): A routable IP address for a LISPtunnel routerTunnel Router (ITR or ETR). Interchangeably referred to as a "locator" in this document. An RLOC is also the output of an EID-to-RLOC mapping lookup; anEID-prefixEID-Prefix maps to one or more RLOCs. Typically, RLOCs are numbered fromtopologically-aggregatabletopologically aggregatable blocks that are assigned to a site at each point where it attaches to the global Internet; where the topology is defined by the connectivity of provider networks, RLOCs can be thought of asProvider AggregatableProvider-Assigned (PA) addresses. Routing for RLOCs is not carried on the ALT. EID-to-RLOC Mapping: A binding between anEID-prefixEID-Prefix and the set of RLOCs that can be used to reach it; sometimes simply referred tosimplyas a "mapping".EID-prefixEID-Prefix Reachability: AnEID-prefixEID-Prefix is said to be "reachable" if at least one of itslocatorsLocators is reachable. That is, anEID-prefixEID-Prefix is reachable if the ETR that is authoritative for a givenEID-to- RLOCEID-to-RLOC mapping is reachable. Default Mapping: ADefault Mapping is amapping entry forEID- prefixEID-Prefix 0.0.0.0/0 (::/0 foripv6).IPv6). It maps to alocator-setLocator-Set used for all EIDs in the Internet. If there is amore specific EID- prefixmore-specific EID-Prefix in themapping cachemap-cache, it overrides the Default Mapping entry. The Default Mapping entry can be learned by configuration or from a Map-Reply message. ALT Default Route: AnEID-prefixEID-Prefix value of 0.0.0.0/0 (or ::/0 foripv6) whichIPv6) that may be learned from the ALT or statically configured on an edgeALT Router.ALT-Router. TheALT-DefaultALT Default Route defines a forwarding path for a packet to be sent into the ALT on a routerwhichthat does not have a full ALT forwarding database. 3. TheLISP+ALT modelLISP-ALT Model TheLISP+ALTLISP-ALT model uses the same basic query/response protocol that is documented in[LISP].[RFC6830]. In particular, LISP+ALT provides two types ofpacketpackets that an ITR can originate to obtain EID-to-RLOC mappings: Map-Request: A Map-Request message is sent into the ALT to request an EID-to-RLOC mapping. The ETRwhichthat owns the mapping will respond to the ITR with a Map-Reply message. Since the ALT only forwards on EID destinations, the destination address of theMap- RequestMap-Request sent on the ALT must be an EID.Data Probe:Data-Probe: Alternatively, an ITR may encapsulate and send the first data packet destined for an EID with no known RLOCs into the ALT as aData Probe.Data-Probe. This might be done to minimize packet loss and to probe for the mapping. As above, the authoritative ETR for theEID-prefixEID-Prefix will respond to the ITR with a Map-Reply message when it receives the data packet over the ALT. As a side-effect, the encapsulated data packet is delivered to the end-system at the ETR site. Note that theData Probe'sData-Probe's inner IP destination address, which is an EID, is copied to the outer IP destination address so that the resulting packet can be routed over the ALT. See Section 3.3 for caveats on the usability ofData Probes.Data-Probes. The term "ALT Datagram" isshort-handshorthand for a Map-Request orData ProbeData-Probe to be sent into or forwarded on the ALT. Note that such packets use an RLOC as theouter headerouter-header source IP address and an EID as theouter headerouter-header destination IP address. Detailed descriptions of the LISP packet types referenced by this document may be found in[LISP].[RFC6830]. 3.1.RouteabilityRoutability of EIDs A LISP EID has the same syntax as an IP address and can be used, unaltered, as the source or destination of an IP datagram. In general, though, EIDs are not routable on the public Internet; LISP+ ALT provides a separate, virtual network, known as the LISP Alternative Logical Topology (ALT) on which a datagram using an EID as an IP destination address may be transmitted. This network is built as an overlay on the public Internet using tunnels to interconnectALT Routers.ALT-Routers. BGP runs over these tunnels to propagate path information needed to forward ALT Datagrams. Importantly, while the ETRs are the source(s) of the unaggregatedEID-prefixes,EID-Prefixes, LISP+ALT uses existing BGP mechanisms to aggregate this information. 3.1.1. Mechanisms for an ETR tooriginate EID-prefixesOriginate EID-Prefixes There are three ways that an ETR may originate its mappings into the ALT: 1. By registration with aMap ServerMap-Server, as documented in[LISP-MS].[RFC6833]. This is the common case and is expected to be used by the majority of ETRs. 2. Using a "static route" on the ALT. Where no Map-Server is available, an edgeALT RouterALT-Router may be configured with a "staticEID-prefixEID-Prefix route" pointing to an ETR. 3. Edge connection to the ALT. If a site requiresfine- grainedfine-grained control over how itsEID-prefixesEID-Prefixes are advertised into the ALT, it may configure its ETR(s) with tunnel and BGP connections to edgeALT Routers.ALT-Routers. 3.1.2. Mechanisms for an ITR toforwardForward toEID-prefixesEID-Prefixes There are three ways that an ITR may send ALT Datagrams: 1. Through aMap ResolverMap-Resolver, as documented in[LISP-MS].[RFC6833]. This is the common case and is expected to be used by the majority of ITRs. 2. Using a "default route". Where aMap ResolverMap-Resolver is not available, an ITR may be configured with a static ALT Default Route pointing to an edgeALT Router.ALT-Router. 3. Edge connection to the ALT. If a site requires fine-grained knowledge of what prefixes exist on the ALT, it may configure its ITR(s) with tunnel and BGP connections to edgeALT Routers.ALT-Routers. 3.1.3.Map ServerMap-Server ModelpreferredPreferred The ALT-connected ITR and ETR cases are expected to be rare, as theMap Server/Map ResolverMap-Server/Map-Resolver model isbothsimpler for an ITR/ETR operator touse,use and also provides a more general service interface to not only theALT,ALT butalsoto other mapping databases that may be developed in the future. 3.2. Connectivity tonon-LISP sitesNon-LISP Sites As stated above, EIDs used as IP addresses by LISP sites are not routable on the public Internet. This implies that, absent a mechanism for communication between LISP and non-LISP sites, connectivity between them is not possible. To resolve this problem, an "interworking" technology has been defined; see[LISP-IW][RFC6832] for details. 3.3. Caveats on theuseUse ofData ProbesData-Probes It is worth noting that there has been a great deal of discussion and controversy about whetherData ProbesData-Probes are a good idea. On the one hand, using them offers a method of avoiding the "first packet drop" problem when an ITR does not have a mapping for a particularEID- prefix.EID-Prefix. On the other hand, forwarding data packets on the ALT would require that it either be engineered to support relatively high traffic rates, which is not generally feasible for a tunneled network, or that it be carefully designed to aggressively rate-limit traffic to avoid congestion or DoS attacks. There may also be issues caused by different latency or other performance characteristics between the ALT path taken by an initialData ProbeData-Probe and the "Internet" path taken by subsequent packets on the same flow once a mapping is in place on an ITR. For these reasons, the use ofData ProbesData-Probes is not recommended at this time; they should only be originated from an ITR when explicitly configured to dososo, and such configuration should only be enabled when performing experiments intended to test the viability of usingData Probes.Data-Probes. 4. LISP+ALT: Overview LISP+ALT is a hybrid push/pull architecture. AggregatedEID-prefixesEID-Prefixes are advertised among theALT RoutersALT-Routers and to those (rare) ITRs that are directly connected via a tunnel and BGP to the ALT. Specific EID-to-RLOC mappings are requested by an ITR (and returned by an ETR) using LISP when it sends a request either via aMap ResolverMap-Resolver or to an edgeALT Router.ALT-Router. The basic idea embodied in LISP+ALT is to use BGP, running on a tunneled overlay network (the ALT), to establish reachability betweenALT Routers.ALT-Routers. The ALT BGPRouteRouting Information Base (RIB) is comprised ofEID-prefixesEID-Prefixes and associated next hops.ALT RoutersALT-Routers interconnect using BGP and propagateEID-prefixEID-Prefix updates among themselves.EID- prefixEID-Prefix information is learned from ETRs at the "edge" of the ALT either through the use of theMap ServerMap-Server interface (thecommmoncommon case), by static configuration, or by BGP-speaking ETRs.Map ResolversMap-Resolvers learns paths through the ALT toMap ServersMap-Servers forEID- prefixes.EID-Prefixes. An ITR will normally use aMap ResolverMap-Resolver to send its ALT Datagrams on to the ALT but may, in unusual cases (see Section 3.1.2), use a static ALT Default Route or connect to the ALT using BGP. Likewise, an ETR will normally register its prefixes in the mapping database using aMap ServerMap-Server or can sometimes (see Section 3.1.1) connect directly to the ALT using BGP. See[LISP-MS][RFC6833] for details onMap ServersMap-Servers andMap Resolvers.Map-Resolvers. Note that while this document specifies the use of Generic Routing Encapsulation (GRE) as a tunneling mechanism, there is no reason that parts of the ALT cannot be built using other tunneling technologies, particularly in cases where GRE does not meet security, management, or other operational requirements. References to "GRE tunnel" in later sections of this document should therefore not be taken as prohibiting or precluding the use of other tunneling mechanisms. Note also that twoALT RoutersALT-Routers that are directly adjacent (with no layer-3 router hops between them) need not use a tunnel between them; in this case, BGP may be configured across the interfaces that connect to their commonsubnetsubnet, and that subnet is then considered to be part of the ALT topology.UseThe use of techniques such as "eBGP multihop" to connectALT RoutersALT-Routers that do not share a tunnel or common subnet is notrecommendedrecommended, as the non-ALTRoutersrouters in between theALT RoutersALT-Routers in such a configuration may not have information necessary to forward ALT Datagrams destined toEID-prefixesEID-Prefixes exchanged across that BGP session. In summary, LISP+ALT uses BGP to build paths throughALT RoutersALT-Routers so that an ALT Datagram sent into the ALT can be forwarded to the ETR that holds the EID-to-RLOC mapping for thatEID-prefix.EID-Prefix. This reachability is carried as IPv4 oripv6 NLRIIPv6 Network Layer Reachability Information (NLRI) without modification (since anEID-prefixEID-Prefix has the same syntax as an IPv4 oripv6IPv6 address prefix).ALT RoutersALT-Routers establish BGP sessions with one another, forming the ALT. AnALT RouterALT-Router at the "edge" of the topology learnsEID-prefixesEID-Prefixes originated by authoritative ETRs. Learning may bethoughthrough theMap ServerMap-Server interface, by static configuration, or via BGP with the ETRs. AnALT RouterALT-Router may also be configured to aggregateEID-prefixesEID-Prefixes received from ETRs or from otherLISP+ALTLISP-ALT Routers that are topologically "downstream" from it. 4.1. ITRtraffic handlingTraffic Handling When an ITR receives a packet originated by anend systemend-system within its site(i.e.(i.e., a host for which the ITR is the exit path out of the site) and the destination EID for that packet is not known in the ITR'smapping cache,map-cache, the ITR creates either a Map-Request for the destination EID or the original packet encapsulated as aData ProbeData-Probe (see Section 3.3 for caveats on the usability ofData Probes).Data-Probes). The result, known as an ALT Datagram, is then sent to anALT RouterALT-Router (see also[LISP-MS][RFC6833] for non-ALT-connected ITRs, noting thatData ProbesData-Probes cannot be sent to a Map-Resolver). This"first hop" ALT Router"first-hop" ALT-Router usesEID-prefixEID-Prefix routing information learned from otherALT RoutersALT-Routers via BGP to guide the packet to the ETRwhichthat "owns" the prefix. Upon receipt by the ETR, normal LISP processing occurs: the ETR responds to the ITR with a LISP Map-Reply that lists the RLOCs (and, thus, the ETRs to use) for theEID-prefix.EID-Prefix. ForData Probes,Data-Probes, the ETR also decapsulates the packet and transmits it toward its destination. Upon receipt of the Map-Reply, the ITR installs the RLOC information for a given prefix into a local mapping database. With these mapping entries stored, additional packets destined to the givenEID-prefixEID-Prefix are routed directly to an RLOC without use of the ALT, until either the entry'sTTLTime to Live (TTL) hasexpired,expired or the ITR can otherwise find no reachable ETR. Note that a current mapping may exist that contains no reachable RLOCs; this is known as a Negative CacheEntryEntry, and it indicates that packets destined to theEID-prefixEID-Prefix are to be dropped. Full details on Map-Request/Map-Reply processing may be found in[LISP].[RFC6830]. Traffic routed on to the ALT consists solely of ALT Datagrams,i.e.i.e., Map-Requests andData ProbesData-Probes (if supported). Given the relatively low performance expected of a tunneled topology,ALT RoutersALT-Routers (andMap Resolvers)Map-Resolvers) should aggressively rate-limit the ingress of ALT Datagrams from ITRs and, if possible, should be configured to not accept packets that are not ALT Datagrams. 4.2. EID Assignment - Hierarchy and Topology The ALT database is organized in aherarchicalhierarchical manner withEID- prefixsEID-Prefixes aggregated on power-of-2 block boundaries. Where a LISP site has multipleEID-prefixesEID-Prefixes that are aligned onapower-of-2a power-of-2 block boundary, they should be aggregated into a singleEID-prefixEID-Prefix for advertisement. The ALT network is built in a roughly hierarchical, partial meshwhichthat is intended to allow aggregation whereclearly-clearly defined hierarchical boundaries exist. Building such a structure should minimize the number ofEID-prefixesEID-Prefixes carried by LISP+ALT nodes near the top of the hierarchy. Routes on the ALT do not need to respond to changes in policy, subscription, or underlying physical connectivity, so the topology can remain relatively static and aggregation can be sustained. Because routing on the ALT uses BGP, the same rules apply for generating aggregates; in particular,a ALT Routeran ALT-Router should only be configured to generate an aggregate if it is configured with BGP sessions to all of the originators of components (more-specific prefixes) of that aggregate. Not all of the componentsofneed to be present for the aggregate to be originated (some may be holes in the coveringprefixprefix, and some may bedown)down), but the aggregating router must be configured to learn the state of all of the components. Under what circumstances theALT RouterALT-Router actually generates the aggregate is a matter of local policy: in some cases, it will be statically configured to do so at all times with a "static discard" route. In other cases, it may be configured to only generate the aggregate prefix if at least one of the components of the aggregate is learned via BGP. AnALT RouterALT-Router must not generate an aggregate that includes anon- LISP-speakingnon-LISP-speaking hole unless it can be configured to return a Negative Map-Reply with action="Natively-Forward" (see[LISP])[RFC6830]) if it receives an ALT Datagram that matches that hole. If it receives an ALT Datagram that matches a LISP-speaking hole that is currently not reachable, it should return a Negative Map-Reply with action="drop". Negative Map-Replies should be returned with a short TTL, as specified in[LISP-MS].[RFC6833]. Note that an off-the-shelf,non-LISP- speakingnon-LISP-speaking router configured as an aggregatingALT RouterALT-Router cannot send Negative Map-Replies, so such a router must never originate an aggregate that includes a non-LISP-speaking hole. This implies that twoALT RoutersALT-Routers that share an overlapping set of prefixes must exchange those prefixes if either is to generate and export a covering aggregate for those prefixes. It also implies that an ETRwhichthat connects to the ALT using BGP must maintain BGP sessions with all of theALT RoutersALT-Routers that are configured to originate an aggregatewhichthat covers that prefix and that each of thoseALT RoutersALT-Routers must be explicitly configured to know the set ofEID-prefixesEID-Prefixes that make up any aggregate that it originates. See also[LISP-MS][RFC6833] for an example of other ways that prefix origin consistency and aggregation can be maintained. As an example, consider ETRs that are originatingEID-prefixesEID-Prefixes for 10.1.0.0/24, 10.1.64.0/24, 10.1.128.0/24, and 10.1.192.0/24. AnALT RouterALT-Router should only be configured to generate an aggregate for 10.1.0.0/16 if it has BGP sessions configured with all of these ETRs, in other words, only if it has sufficient knowledge about the state of those prefixes to summarize them. If the Router originating 10.1.0.0/16 receives an ALT Datagram destined for 10.1.77.88, anon- LISPnon-LISP destination covered by the aggregate, it returns a NegativeMap- ReplyMap-Reply with action "Natively-Forward". If it receives an ALT Datagram destined for 10.1.128.199 but the configured LISP prefix 10.1.128.0/24 is unreachable, it returns a Negative Map-Reply with action "drop". Note:muchMuch is currently uncertain about the best way to build the ALT network; as testing and prototype deploymentproceeds,proceed, a guide to how to best build the ALT network will be developed. 4.3. Use of GRE and BGP betweenLISP+ALTLISP-ALT Routers The ALT network is built using GRE tunnels betweenALT Routers.ALT-Routers. BGP sessions are configured over those tunnels, with eachALT RouterALT-Router acting as a separateASAutonomous System (AS) "hop" in a Path Vector for BGP. For the purposes of LISP+ALT, the AS-path is used solely as a shortest-path determination and loop-avoidance mechanism. Because allnext-hopsnext hops are on tunnel interfaces, no IGP is required to resolve thosenext-next hops to exit interfaces. LISP+ALT's use of GRE and BGPfacilitiesfacilitates deployment and operation of LISP because no new protocols need to be defined, implemented, or used on the overlay topology; existing BGP/GRE tools and operational expertise are also re-used. Tunnel address assignment is also easy: since the addresses on an ALT tunnel are only used by the pair of routers connected to the tunnel, the only requirement of the IP addresses used to establish that tunnel is that the attached routers be reachable by each other; any addressing plan, including private addressing, can therefore be used for ALT tunnels. 5.EID-prefixEID-Prefix Propagation and Map-Request Forwarding As described in Section 8.2, an ITR sends an ALT Datagram to a given EID-to-RLOC mapping. The ALT provides the infrastructure that allows these requests to reach the authoritative ETR. Note that under normal circumstances Map-Replies are not sent over the ALT; an ETR sends a Map-Reply to one of the ITR RLOCs learned from the original Map-Request. SeesectionsSections 6.1.2 and 6.2 of[LISP][RFC6830] for more information on the use of the Map-RequestITR'ITR RLOC Address' field. Keep in mind that theITR'ITR RLOC Address' field supportsmulitplemultiple RLOCs in multiple address families, so a Map-Reply sent in response to aMap- RequestMap-Request is not necessarily senttoback to the Map-Request RLOC source. There may be scenarios, perhaps to encourage caching of EID-to-RLOC mappings byALT Routers,ALT-Routers, where Map-Replies could be sent over the ALT or where a "first-hop"ALT RouterALT-Router might modify the originating RLOC on a Map-Request received from an ITR to force the Map-Reply to be returned to the "first-hop"ALT Router.ALT-Router. These cases will not be supported by initial LISP+ALT implementations but may be subject to future experimentation.ALT RoutersALT-Routers propagate path information via BGP ([RFC4271]) that is used by ITRs to send ALT Datagrams toward the appropriate ETR for eachEID-prefix.EID-Prefix. BGP is run on theinter-ALT Routerinter-ALT-Router links, and possibly between an edge("last hop") ALT Router("last-hop") ALT-Router and an ETR or between an edge("first hop") ALT Router("first-hop") ALT-Router and an ITR. The ALT BGP RIB consists of aggregatedEID-prefixesEID-Prefixes and their next hops toward the authoritative ETR for thatEID-prefix.EID-Prefix. 5.1. Changes to ITRbehaviorBehavior with LISP+ALT As previously described, an ITR will usually use theMap ResolverMap-Resolver interface and will send its Map Requests to aMap Resolver.Map-Resolver. When an ITR instead connects via tunnels and BGP to the ALT, it sends ALT Datagrams to one of its "upstream"ALT Routers;ALT-Routers; these are sent only to obtain new EID-to-RLOC mappings--- RLOC probe and cache TTL refresh Map-Requests are not sent on the ALT. As in basic LISP, it should use one of its RLOCs as the source address of these queries; it should not use a tunnel interface as the sourceaddressaddress, as doing so will cause replies to be forwarded over the tunneled topology and may be problematic if the tunnel interface address is not routed throughout the ALT. If the ITR is running BGP with theLISP+ALT router(s),LISP-ALT Router(s), it selects the appropriateALT RouterALT-Router based on the BGP information received. If it is not running BGP, it uses astatically-configuedstatically configured ALT Default Route to select anALT Router.ALT-Router. 5.2. Changes to ETRbehaviorBehavior with LISP+ALT As previously described, an ETR will usually use theMap ServerMap-Server interface (see[LISP-MS])[RFC6833]) and will register itsEID-prefixesEID-Prefixes with its configuredMap Servers.Map-Servers. When an ETR instead connects using BGP to one or moreALT Routers,ALT-Routers, it announces itsEID-prefix(es)EID-Prefix(es) to thoseALT Routers.ALT-Routers. As documented in[LISP],[RFC6830], when an ETR generates a Map-Reply message to return to a querying ITR, it sets theouter headerouter-header IP destination address to one of the requesting ITR's RLOCs so that the Map-Reply will be sent on the underlying Internet topology, not on the ALT; this avoids any latency penalty (or "stretch") that might be incurred by sending the Map-Reply via the ALT, reduces load on the ALT, and ensures that the Map-Reply can be routed even if the original ITR does not have an ALT-routed EID. For details on how an ETR selects which ITR RLOC to use, seesectionSection 6.1.5 of[LISP].[RFC6830]. 5.3. ALT Datagramforwarding falureForwarding Failure IntermediateALT Routers,ALT-Routers forward ALT Datagrams using normal,hop-by- hophop-by-hop routing on the ALT overlay network. Should anALT routerALT-Router not be able to forward an ALT Datagram, whether due to an unreachablenext-next hop, TTL exceeded, or other problem, it has several choices: o If theALT RouterALT-Router understandsthe LISP protocol,LISP, as is the case for aMap ResolverMap-Resolver orMap Server,Map-Server, it may respond to a forwarding failure by returning anegativeNegative Map-Reply, as described in Section 4.2 and[LISP-MS].[RFC6833]. o If theALT RouterALT-Router does not understand LISP, it may attempt to return an ICMP message to the source IP address of the packet that cannot be forwarded. Since the source address is an RLOC, anALT RouterALT-Router would send this ICMP message using "native" Internet connectivity, not via the ALT overlay. o A non-LISP-capableALT RouterALT-Router may also choose to silently drop the non-forwardable ALT Datagram.[LISP][RFC6830] and[LISP-MS][RFC6833] define how the source of an ALT Datagram should handle each of these cases. The last case, where an ALT Datagram is silently discarded, will generally result in several retransmissions by the source, followed by treating the destination as unreachable via LISP when no Map-Reply is received. If a problem on the ALT is severe enough to prevent ALT Datagrams from being delivered to a specific EID, this is probably the only sensible way to handle this case. Note that the use of GRE tunnels should prevent MTU problems from ever occurring on the ALT; an ALT Datagram that exceeds an intermediate MTU will be fragmented at that point and will be reassembled by the target of the GRE tunnel. 6. BGPconfigurationConfiguration andprotocol considerationsProtocol Considerations 6.1. Autonomous System Numbers (ASNs) in LISP+ALT The primary use of BGP today is to define the global Internet routing topology in terms of its participants, known as Autonomous Systems. LISP+ALT specifies the use of BGP to create a global overlay network (the ALT) for finding EID-to-RLOC mappings. While related to the global routing database, the ALT serves a very different purpose and is organized into a very different hierarchy. Because LISP+ALT does use BGP, however, it uses ASNs in the paths that are propagated amongALT Routers.ALT-Routers. To avoid confusion, LISP+ALT should usenewly-assignednewly assigned AS numbers that are unrelated to the ASNs used by the global routing system. Exactly how this new space will be assigned and managed will be determined during the deployment of LISP+ALT. Note that theALT RoutersALT-Routers that make up the "core" of the ALT will not be associated with any existing core-Internet ASN because the ALT topology is completely separate from, and independent of, the global Internet routing system. 6.2.Sub-AddressSubsequent Address Family Identifier (SAFI) for LISP+ALT As defined by this document, LISP+ALT may be implemented using BGP without modification. Given the fundamental operational difference between propagating global Internet routing information (the current dominant use of BGP) and creating an overlay network for findingEID- to-RLOCEID-to-RLOC mappings (the use of BGP as proposed by this document), it may be desirable to assign a new SAFI [RFC4760] to prevent operational confusion and difficulties, including the inadvertent leaking of information from one domain to the other.UseThe use of a separate SAFI would make it easier to debug many operational problems but would come at a significant cost: unmodified, off-the-shelf routerswhichthat do not understand the new SAFI could not be used to build any part of the ALT network. At present, this document does not request the assignment of a new SAFI; additional experimentation may suggest the need for one in the future. 7.EID-prefixEID-Prefix Aggregation To facilitateEID-prefixEID-Prefix aggregation, the ALT BGP topology is provisioned in a hierarchical manner; the fact that all inter-node links are tunnels means that topology can be constrained to follow theEID-prefixEID-Prefix assignment hierarchy. Redundant links are provisioned to compensate for node and link failures. A basic assumption is that as long as the routers are up and running, the underlying Internet will provide alternative routes to maintain tunnel and BGP connectivity amongALT Routers.ALT-Routers. Note that, as mentioned in Section 4.2, the use of BGP by LISP+ALT requires that information only be aggregated where all active more- specific prefixes of a generated aggregate prefix are known. This is no different than the way that BGP route aggregation works in the existing global routing system: a service provider only generates an aggregate route if it is configured to learntoall prefixes that make up that aggregate. 7.1. Stability of the ALT It is worth noting that LISP+ALT does not directly propagateEID-to- RLOCEID-to-RLOC mappings. What it does is provide a mechanism for an ITR tocommonicatecommunicate with the ETR that holds the mapping for a particularEID- prefix.EID-Prefix. This distinction is important when considering the stability of BGP on the ALT network as compared to the global routing system. It also has implications for how site-specificEID-prefixEID-Prefix information may be used by LISP but not propagated by LISP+ALT (see Section 7.2 below). RLOC prefixes are not propagated through theALTALT, so their reachability is not determined through the use of LISP+ALT. Instead, reachability of RLOCs is learned through the LISP ITR-ETR exchange. This means that link failures or other service disruptions that may cause the reachability of an RLOC to change are not known to the ALT. Changes to the presence of anEID-prefixEID-Prefix on the ALT occur much less frequently: only at subscription time or in the event of a failure of the ALT infrastructure itself. This means that "flapping" (frequent BGP updates and withdrawals due to prefix state changes) is not likely and mapping information cannot become "stale" due to slow propagation through the ALT BGP mesh. 7.2. Trafficengineering usingEngineering Using LISP Since an ITR learns an EID-to-RLOC mapping directly from the ETR that owns it, it is possible to perform site-to-sitetraffic engineeringTraffic Engineering by setting the preference and/or weight fields, and by including more-specific EID-to-RLOC information in Map-Reply messages. This is a powerful mechanism that can conceivably replace the traditional practice of routing prefix deaggregation fortraffic engineeringTraffic Engineering purposes. Rather than propagating more-specific information into the global routing system forlocal-local orregional-regional optimization of traffic flows, such more-specific information can be exchanged, through LISP (not LISP+ALT), on an as-needed basis between only those ITRs/ETRs (and, thus, site pairs) that need it. Such an exchange of "more-specifics" between sites facilitatestraffic engineering,Traffic Engineering by allowing richer and more fine-grained policies to be applied without advertising additional prefixes into either the ALT or the global routing system. Note that these newtraffic engineeringTraffic Engineering capabilities are an attribute of LISP and are not specific to LISP+ALT; discussion is included here because the BGP-based global routing system has traditionally used propagation of more-specific routes as a crude form oftraffic engineering.Traffic Engineering. 7.3. EdgeaggregationAggregation anddampeningDampening Normal BGP best common practices apply to the ALT network. In particular, first-hopALT RoutersALT-Routers will aggregateEID prefixesEID-Prefixes and dampen changes to them in the face of excessive updates. SinceEID- prefixEID-Prefix assignments are not expected to change as frequently as global routing BGP prefix reachability, such dampening should be veryrare,rare and might be worthy of logging as an exceptional event. It is again worth noting that the ALT carries onlyEID-prefixes,EID-Prefixes, used toaconstruct a BGP path to each ETR (or Map-Server) that originates each prefix; the ALT does not carry reachability information about RLOCs. In addition,EID-prefixEID-Prefix information may be aggregated as the topology and address assignment hierarchy allow. Since the topology is all tunneled and can be modified as needed, reasonably good aggregation should be possible. In addition, since most ETRs are expected to connect to the ALT using theMap ServerMap-Server interface,Map ServersMap-Servers will implement a natural "edge" for the ALT where dampening and aggregation can be applied. For these reasons, the set of prefix information on the ALT can be expected to be both better aggregated and considerably less volatile than the actual EID-to-RLOC mappings. 7.4. EIDassignment flexibilityAssignment Flexibility vs. ALTscalingScaling There are major open questions regarding how the ALT will be deployed and what organization(s) will operate it. In a simple,non- distributednon-distributed world, centralized administration ofEID prefixEID-Prefix assignment and ALT network design would facilitate awell- aggregatedwell-aggregated ALT routing system. Business and other realities will likely result in a more complex, distributed system involving multiple levels of prefix delegation, multiple operators of parts of the ALT infrastructure, and a combination of competition and cooperation among the participants. In addition, the re-use of existing IP address assignments, bothprovider-independentProvider-Independent ("PI") andprovider-assignedProvider- Assigned ("PA"), to avoid renumbering when sites transition to LISP will further complicate the processes of building and operating the ALT. A number of conflicting considerations need to be kept in mind when designing and building the ALT. Among them are: 1. Target ALT routing state size and level of aggregation. As described in Section 7.1, the ALT should not suffer fromsome ofthe same performance constraints or stability issues as does the Internet global routing system, so some reasonable level of deaggregation and an increased number ofEID prefixesEID-Prefixes beyond what might be considered ideal should be acceptable. That said, measures, such as tunnel rehoming to preserve aggregation when sites move from one mapping provider to another and implementing aggregation at multiple levels in the hierarchy to collapsede-aggregationdeaggregation at lower levels, should be taken to reduce unnecessary explosion of ALT routing state. 2. Number of operators of parts of the ALT and how they will be organized (hierarchical delegation vs. shared administration). This will determine not only howEID prefixesEID-Prefixes are assigned but also how tunnels are configured and howEID prefixesEID-Prefixes can be aggregated between different parts of the ALT. 3. Number of connections between different parts of the ALT.Trade- offsTradeoffs will need to be made among resilience, performance, and placement of aggregation boundaries. 4.EID prefixEID-Prefix portability between competing operators of the ALT infrastructure. A significant benefit for anend-siteend site to adopt LISP is the availability of EID space that is not tied to a specific connectivity provider; it is important to ensure that an end site doesn't trade lock-in to a connectivity provider for lock-in to a provider of its EID assignment, ALT connectivity, orMap ServerMap-Server facilities. This is, by no means, an exhaustive list. While resolving these issues is beyond the scope of this document, the authors recommend that existing distributed resource structures, such as the IANA/Regional Internet Registries and the ICANN/Domain Registrar, be carefully considered when designing and deploying the ALT infrastructure. 8. ConnectingsitesSites to the ALTnetworkNetwork 8.1. ETRsoriginating informationOriginating Information into the ALTEID-prefixEID-Prefix information is originated into the ALT by three different mechanisms:Map Server:Map-Server: In most cases, a site will configure its ETR(s) to register with one or moreMap ServersMap-Servers (see[LISP-MS]),[RFC6833]) and does not participate directly in the ALT. BGP: Fora sitesites requiring complex control over theirEID-prefixEID-Prefix origination into the ALT, an ETR may connect to the LISP+ALT overlay network by running BGP to one or moreALT Router(s)ALT-Routers over tunnel(s). The ETR advertises reachability for itsEID-prefixesEID-Prefixes over these BGP connection(s). The edgeALT Router(s)ALT-Router(s) that receive(s) these prefixes then propagate(s) them into the ALT.HereHere, the ETR is simplyana BGP peer ofALT Router(s)ALT-Router(s) at the edge of the ALT. Where possible, anALT RouterALT-Router that receivesEID-prefixesEID-Prefixes from an ETR via BGP should aggregate that information. Configuration: One or moreALT Router(s)ALT-Routers may be configured to originate anEID-prefixEID-Prefix on behalf of the non-BGP-speaking ETR that is authoritative for a prefix. As in the case above, the ETR is connected toALT Router(s)ALT-Router(s) using GREtunnel(s)tunnel(s), but rather than BGP being used, theALT Router(s)ALT-Router(s) are configured with what are in effect "static routes" for theEID-prefixesEID-Prefixes "owned" by the ETR. The GRE tunnel is used to route Map-Requests to the ETR. Note:inIn all cases, an ETR may register to multipleMap ServersMap-Servers or connect to multipleALT RoutersALT-Routers for the following reasons: * redundancy, so that a particular ETR is still reachable even if one path or tunnel is unavailable. * to connect to different parts of the ALT hierarchy if the ETR "owns" multiple EID-to-RLOC mappings forEID-prefixesEID-Prefixes that cannot be aggregated by the sameALT Router (i.e.ALT-Router (i.e., are not topologically "close" to each other in the ALT). 8.2. ITRs Using the ALT In the common configuration, an ITR does not need to know anything about the ALT, since it sends Map-Requests to one of its configured Map-Resolvers (see[LISP-MS]).[RFC6833]). There are two exceptional cases: Static default: If aMap ResolverMap-Resolver is not available but an ITR is adjacent to anALT RouterALT-Router (either over a common subnet or through the use of a tunnel), it can use an ALT Default Routerouteto cause all ALT Datagrams to be sent to thatALT Router.ALT-Router. This case is expected to be rare. Connection to ALT: A site with complex Internet connectivityneedsmay need more fine-grained distinction between traffic toLISP- capableLISP-capable and non-LISP-capable sites. Such a site may configure each of its ITRs to connect directly to the ALT, using a tunnel and BGP connection. In this case, the ITR will receiveEID-prefixEID-Prefix routes from its BGP connection to theALT RouterALT-Router and will LISP- encapsulate and send ALT Datagrams through the tunnel to theALT Router.ALT-Router. Traffic to other destinations may be forwarded (without LISP encapsulation) to non-LISP next-hop routers that the ITR knows. In general, an ITR that connects to the ALT does so only toto ALT RoutersALT-Routers at the "edge" of the ALT (typically two for redundancy). There may, though, be situations where an ITR would connect to otherALT RoutersALT-Routers to receive additional,shorter pathshorter-path information about a portion of the ALT of interest to it. This can be accomplished by establishing GRE tunnels between the ITR and the set ofALT RoutersALT-Routers with the additional information. This is a purely local policy issue between the ITR and theALT RoutersALT-Routers in question. As described in[LISP-MS],[RFC6833], Map-Resolvers do not accept or forwardData Probes;Data-Probes; in the rare scenario that an ITR does support and originateData Probes,Data-Probes, it must do so using one of the exceptional configurations described above. Note that the use ofData ProbesData-Probes is discouraged at this time (see Section 3.3). 9.IANA Considerations This document makes no request of the IANA. 10.Security Considerations LISP+ALT shares many of the security characteristics of BGP. Its security mechanisms are comprised of existing technologies in wide operational use today, so securing the ALT should be mostly a matter of applying the same technology that is used to secure the BGP-based global routing system (see Section10.39.3 below).10.1.9.1. Apparent LISP+ALT Vulnerabilities This section briefly lists the known potential vulnerabilities of LISP+ALT. MappingIntegrity:integrity: Potential for an attacker to insert bogus mappings to black-hole (createDenial-of-Service, ora DoS attack) or intercept LISP data-plane packets.ALT Router Availability:ALT-Router availability: Can an attacker DoS theALT RoutersALT-Routers connected to a given ETR? If a site's ETR cannot advertise its EID-to-RLOC mappings, the site is essentially unavailable. ITRMapping/Resources:mapping/resources: Can an attacker force an ITR orALT RouterALT-Router to drop legitimate mapping requests by flooding it with random destinations for which it will generate large numbers ofMap- RequestsMap-Requests and fill itsmapping cache?map-cache? Further study is required to see the impact of admission control on the overlay network. EID Map-RequestExploitsexploits forReconnaissance:reconnaissance: Can an attacker learn about a LISP site's TE policy by sending legitimate mapping requests and then observing the RLOC mapping replies? Is this information useful in attacking or subverting peer relationships? Note that any public LISP mapping database will have similardata- planedata-plane reconnaissanceissue.issues. Scaling ofALT Router Resources:ALT-Router resources: Paths through the ALT may be of lesser bandwidth than more "direct" paths; this may make them more prone to high-volumedenial-of-serviceDoS attacks. For this reason, all components of the ALT (ETRs andALT Routers)ALT-Routers) should be prepared to rate-limit traffic (ALT Datagrams) that could be received across the ALT. UDP Map-Reply from ETR: Since Map-Replies are sent directly from the ETR to the ITR's RLOC, the ITR's RLOC may be vulnerable to various types of DoS attacks (this is a general property of LISP, notana LISP+ALT vulnerability). More-specific prefix leakage: BecauseEID-prefixesEID-Prefixes on the ALT are expected to be fairly well-aggregated andEID-prefixesEID-Prefixes propagated out to the global Internet (see[LISP-IW])[RFC6832]) much more so, accidental leaking or malicious advertisement of anEID-prefixEID-Prefix into the global routing system could cause traffic redirection away from a LISP site. This is not really a new problem, though, and its solution can only be achieved by much more strict prefix filtering and authentication on the global routing system. SectionSection 10.39.3 describes anexistingapproachexisting approach to solving this problem.10.2.9.2. Survey of LISP+ALT Security Mechanisms Explicit peering: The devices themselves canbothprioritize incomingpackets,packets as well as potentially do key checks in hardware to protect the control plane. Use of TCP to connect elements: This makes it difficult for third parties to inject packets. Use of HMAC to protect BGP/TCP connections:HMACHashed Message Authentication Code (HMAC) [RFC5925] is used to verify the integrity and authenticity of TCP connections used to exchange BGP messages, making it nearly impossible forthird partythird-party devices to either insert or modify messages. Message sequence numbers and nonce values in messages: This allows an ITR to verify that the Map-Reply from an ETR is in response to a Map-Request originated by that ITR (this is a general property of LISP; LISP+ALT does not change this behavior).10.3.9.3. Use ofnew IETF standardAdditional BGP SecuritymechanismsMechanisms LISP+ALT's use of BGP allows it to take advantage of BGP security features designed for existing Internet BGP use. This means that LISP+ALT can and should use technology developed for adding security to BGP (in the IETF SIDR working group or elsewhere) to provide authentication ofEID-prefixEID-Prefix origination and EID-to-RLOC mappings.11.10. Acknowledgments The authors would like to specially thank J. NoelChiappaChiappa, who was a keycontributercontributor to the design of theLISP-CONSContent distribution Overlay Network Service for LISP (LISP-CONS) mapping database (many ideas from which made their way into LISP+ALT) and who has continued to provide invaluable insight as the LISP effort has evolved. Others who have provided valuable contributions include John Zwiebel, Hannu Flinck, Amit Jain, John Scudder, Scott Brim, and Jari Arkko.12.11. References12.1.11.1. Normative References[LISP] Farinacci, D., Fuller, V., Meyer, D., and D. Lewis, "Locator/ID Separation Protocol (LISP)", draft-ietf-lisp-20.txt (work in progress), January 2012. [LISP-MS] Fuller, V. and D. Farinacci, "LISP Map Server", draft-ietf-lisp-ms-16.txt (work in progress), January 2012.[RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, "Generic Routing Encapsulation (GRE)", RFC 2784, March 2000. [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, January 2006. [RFC4632] Fuller, V. and T. Li, "Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan", BCP 122, RFC 4632, August 2006. [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, "Multiprotocol Extensions for BGP-4", RFC 4760, January 2007.12.2. Informative References [LISP-IW] Lewis,[RFC6830] Farinacci, D., Fuller, V., Meyer, D.,Farinacci, D.,andV.D. Lewis, "The Locator/ID Separation Protocol (LISP)", RFC 6830, January 2013. [RFC6833] Fuller,"Interworking LISP with IPv4V. andipv6", draft-ietf-lisp-interworking-02.txt (work in progress), March 2011.D. Farinacci, "Locator/ID Separation Protocol (LISP) Map-Server Interface", RFC 6833, January 2013. 11.2. Informative References [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, June 2010. [RFC6832] Lewis, D., Meyer, D., Farinacci, D., and V. Fuller, "Interworking between Locator/ID Separation Protocol (LISP) and Non-LISP Sites", RFC 6832, January 2013. Authors' Addresses Vince FullerCisco Tasman Drive San Jose, CA 95134 USA Email: vaf@cisco.comEMail: vaf@vaf.net Dino Farinacci Cisco Systems Tasman Drive San Jose, CA 95134 USAEmail: dino@cisco.comEMail: farinacci@gmail.com Dave Meyer Cisco Systems Tasman Drive San Jose, CA 95134 USAEmail: dmm@cisco.comEMail: dmm@1-4-5.net Darrel Lewis Cisco Systems Tasman Drive San Jose, CA 95134 USAEmail:EMail: darlewis@cisco.com