draft-ietf-lisp-eid-anonymity-02.txt | draft-ietf-lisp-eid-anonymity-03.txt | |||
---|---|---|---|---|
Network Working Group D. Farinacci | Network Working Group D. Farinacci | |||
Internet-Draft lispers.net | Internet-Draft lispers.net | |||
Intended status: Experimental P. Pillay-Esnault | Intended status: Experimental P. Pillay-Esnault | |||
Expires: October 25, 2018 Huawei Technologies | Expires: April 18, 2019 Huawei Technologies | |||
W. Haddad | W. Haddad | |||
Ericsson | Ericsson | |||
April 23, 2018 | October 15, 2018 | |||
LISP EID Anonymity | LISP EID Anonymity | |||
draft-ietf-lisp-eid-anonymity-02 | draft-ietf-lisp-eid-anonymity-03 | |||
Abstract | Abstract | |||
This specification will describe how ephemeral LISP EIDs can be used | This specification will describe how ephemeral LISP EIDs can be used | |||
to create source anonymity. The idea makes use of frequently | to create source anonymity. The idea makes use of frequently | |||
changing EIDs much like how a credit-card system uses a different | changing EIDs much like how a credit-card system uses a different | |||
credit-card numbers for each transaction. | credit-card numbers for each transaction. | |||
Requirements Language | Requirements Language | |||
skipping to change at page 1, line 42 ¶ | skipping to change at page 1, line 42 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on October 25, 2018. | This Internet-Draft will expire on April 18, 2019. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2018 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 32 ¶ | skipping to change at page 2, line 32 ¶ | |||
6. Interworking Considerations . . . . . . . . . . . . . . . . . 5 | 6. Interworking Considerations . . . . . . . . . . . . . . . . . 5 | |||
7. Multicast Considerations . . . . . . . . . . . . . . . . . . 5 | 7. Multicast Considerations . . . . . . . . . . . . . . . . . . 5 | |||
8. Performance Improvements . . . . . . . . . . . . . . . . . . 5 | 8. Performance Improvements . . . . . . . . . . . . . . . . . . 5 | |||
9. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | 9. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | |||
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | |||
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
11.1. Normative References . . . . . . . . . . . . . . . . . . 6 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 6 | |||
11.2. Informative References . . . . . . . . . . . . . . . . . 8 | 11.2. Informative References . . . . . . . . . . . . . . . . . 8 | |||
Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 8 | Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 8 | |||
Appendix B. Document Change Log . . . . . . . . . . . . . . . . 8 | Appendix B. Document Change Log . . . . . . . . . . . . . . . . 8 | |||
B.1. Changes to draft-ietf-lisp-eid-anonymity-02 . . . . . . . 8 | B.1. Changes to draft-ietf-lisp-eid-anonymity-03 . . . . . . . 8 | |||
B.2. Changes to draft-ietf-lisp-eid-anonymity-01 . . . . . . . 8 | B.2. Changes to draft-ietf-lisp-eid-anonymity-02 . . . . . . . 8 | |||
B.3. Changes to draft-ietf-lisp-eid-anonymity-00 . . . . . . . 8 | B.3. Changes to draft-ietf-lisp-eid-anonymity-01 . . . . . . . 8 | |||
B.4. Changes to draft-farinacci-lisp-eid-anonymity-02 . . . . 9 | B.4. Changes to draft-ietf-lisp-eid-anonymity-00 . . . . . . . 9 | |||
B.5. Changes to draft-farinacci-lisp-eid-anonymity-01 . . . . 9 | B.5. Changes to draft-farinacci-lisp-eid-anonymity-02 . . . . 9 | |||
B.6. Changes to draft-farinacci-lisp-eid-anonymity-00 . . . . 9 | B.6. Changes to draft-farinacci-lisp-eid-anonymity-01 . . . . 9 | |||
B.7. Changes to draft-farinacci-lisp-eid-anonymity-00 . . . . 9 | ||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
1. Introduction | 1. Introduction | |||
The LISP architecture [RFC6830] specifies two namespaces, End-Point | The LISP architecture [RFC6830] specifies two namespaces, End-Point | |||
IDs (EIDs) and Routing Locators (RLOCs). An EID identifies a node in | IDs (EIDs) and Routing Locators (RLOCs). An EID identifies a node in | |||
the network and the RLOC indicates the EID's topological location. | the network and the RLOC indicates the EID's topological location. | |||
Typically EIDs are globally unique so a end-node system can connect | Typically EIDs are globally unique so a end-node system can connect | |||
to any other end-node system on the Internet. Privately used EIDs | to any other end-node system on the Internet. Privately used EIDs | |||
are allowed when scoped within a VPN but must always be unique within | are allowed when scoped within a VPN but must always be unique within | |||
skipping to change at page 8, line 10 ¶ | skipping to change at page 8, line 10 ¶ | |||
[RFC8061] Farinacci, D. and B. Weis, "Locator/ID Separation Protocol | [RFC8061] Farinacci, D. and B. Weis, "Locator/ID Separation Protocol | |||
(LISP) Data-Plane Confidentiality", RFC 8061, | (LISP) Data-Plane Confidentiality", RFC 8061, | |||
DOI 10.17487/RFC8061, February 2017, | DOI 10.17487/RFC8061, February 2017, | |||
<https://www.rfc-editor.org/info/rfc8061>. | <https://www.rfc-editor.org/info/rfc8061>. | |||
11.2. Informative References | 11.2. Informative References | |||
[I-D.farinacci-lisp-ecdsa-auth] | [I-D.farinacci-lisp-ecdsa-auth] | |||
Farinacci, D. and E. Nordmark, "LISP Control-Plane ECDSA | Farinacci, D. and E. Nordmark, "LISP Control-Plane ECDSA | |||
Authentication and Authorization", draft-farinacci-lisp- | Authentication and Authorization", draft-farinacci-lisp- | |||
ecdsa-auth-02 (work in progress), April 2018. | ecdsa-auth-03 (work in progress), September 2018. | |||
[I-D.ietf-lisp-eid-mobility] | [I-D.ietf-lisp-eid-mobility] | |||
Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino, | Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino, | |||
F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a | F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a | |||
Unified Control Plane", draft-ietf-lisp-eid-mobility-01 | Unified Control Plane", draft-ietf-lisp-eid-mobility-02 | |||
(work in progress), November 2017. | (work in progress), May 2018. | |||
[I-D.ietf-lisp-signal-free-multicast] | [I-D.ietf-lisp-signal-free-multicast] | |||
Moreno, V. and D. Farinacci, "Signal-Free LISP Multicast", | Moreno, V. and D. Farinacci, "Signal-Free LISP Multicast", | |||
draft-ietf-lisp-signal-free-multicast-09 (work in | draft-ietf-lisp-signal-free-multicast-09 (work in | |||
progress), March 2018. | progress), March 2018. | |||
Appendix A. Acknowledgments | Appendix A. Acknowledgments | |||
The author would like to thank the LISP WG for their review and | The author would like to thank the LISP WG for their review and | |||
acceptance of this draft. | acceptance of this draft. | |||
Appendix B. Document Change Log | Appendix B. Document Change Log | |||
[RFC Editor: Please delete this section on publication as RFC.] | [RFC Editor: Please delete this section on publication as RFC.] | |||
B.1. Changes to draft-ietf-lisp-eid-anonymity-02 | B.1. Changes to draft-ietf-lisp-eid-anonymity-03 | |||
o Posted October 2018. | ||||
o Update document timer and references. | ||||
B.2. Changes to draft-ietf-lisp-eid-anonymity-02 | ||||
o Posted April 2018. | o Posted April 2018. | |||
o Update document timer and references. | o Update document timer and references. | |||
B.2. Changes to draft-ietf-lisp-eid-anonymity-01 | B.3. Changes to draft-ietf-lisp-eid-anonymity-01 | |||
o Posted October 2017. | o Posted October 2017. | |||
o Add to section 5 that PKI can be used to authenticate EIDs. | o Add to section 5 that PKI can be used to authenticate EIDs. | |||
o Update references. | o Update references. | |||
B.3. Changes to draft-ietf-lisp-eid-anonymity-00 | B.4. Changes to draft-ietf-lisp-eid-anonymity-00 | |||
o Posted August 2017. | o Posted August 2017. | |||
o Made draft-farinacci-lisp-eid-anonymity-02 a LISP working group | o Made draft-farinacci-lisp-eid-anonymity-02 a LISP working group | |||
document. | document. | |||
B.4. Changes to draft-farinacci-lisp-eid-anonymity-02 | B.5. Changes to draft-farinacci-lisp-eid-anonymity-02 | |||
o Posted April 2017. | o Posted April 2017. | |||
o Added section describing how ephemeral-EIDs can use a public key | o Added section describing how ephemeral-EIDs can use a public key | |||
hash as an alternative to a random number. | hash as an alternative to a random number. | |||
o Indciate when an EID/RLOC co-located, that the xTR can register | o Indciate when an EID/RLOC co-located, that the xTR can register | |||
the EID when it is configured or changed versus waiting for a | the EID when it is configured or changed versus waiting for a | |||
packet to be sent as in the EID/RLOC separated case. | packet to be sent as in the EID/RLOC separated case. | |||
B.5. Changes to draft-farinacci-lisp-eid-anonymity-01 | B.6. Changes to draft-farinacci-lisp-eid-anonymity-01 | |||
o Posted October 2016. | o Posted October 2016. | |||
o Update document timer. | o Update document timer. | |||
B.6. Changes to draft-farinacci-lisp-eid-anonymity-00 | B.7. Changes to draft-farinacci-lisp-eid-anonymity-00 | |||
o Posted April 2016. | o Posted April 2016. | |||
o Initial posting. | o Initial posting. | |||
Authors' Addresses | Authors' Addresses | |||
Dino Farinacci | Dino Farinacci | |||
lispers.net | lispers.net | |||
San Jose, CA | San Jose, CA | |||
End of changes. 13 change blocks. | ||||
19 lines changed or deleted | 26 lines changed or added | |||
This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |