draft-ietf-lisp-rfc6830bis-04.txt | draft-ietf-lisp-rfc6830bis-05.txt | |||
---|---|---|---|---|
Network Working Group D. Farinacci | Network Working Group D. Farinacci | |||
Internet-Draft V. Fuller | Internet-Draft V. Fuller | |||
Intended status: Standards Track D. Meyer | Intended status: Standards Track D. Meyer | |||
Expires: January 18, 2018 D. Lewis | Expires: March 2, 2018 D. Lewis | |||
Cisco Systems | Cisco Systems | |||
A. Cabellos (Ed.) | A. Cabellos (Ed.) | |||
UPC/BarcelonaTech | UPC/BarcelonaTech | |||
July 17, 2017 | August 29, 2017 | |||
The Locator/ID Separation Protocol (LISP) | The Locator/ID Separation Protocol (LISP) | |||
draft-ietf-lisp-rfc6830bis-04 | draft-ietf-lisp-rfc6830bis-05 | |||
Abstract | Abstract | |||
This document describes the data-plane protocol for the Locator/ID | This document describes the data-plane protocol for the Locator/ID | |||
Separation Protocol (LISP). LISP defines two namespaces, End-point | Separation Protocol (LISP). LISP defines two namespaces, End-point | |||
Identifiers (EIDs) that identify end-hosts and Routing Locators | Identifiers (EIDs) that identify end-hosts and Routing Locators | |||
(RLOCs) that identify network attachment points. With this, LISP | (RLOCs) that identify network attachment points. With this, LISP | |||
effectively separates control from data, and allows routers to create | effectively separates control from data, and allows routers to create | |||
overlay networks. LISP-capable routers exchange encapsulated packets | overlay networks. LISP-capable routers exchange encapsulated packets | |||
according to EID-to-RLOC mappings stored in a local map-cache. The | according to EID-to-RLOC mappings stored in a local map-cache. The | |||
skipping to change at page 1, line 46 ¶ | skipping to change at page 1, line 46 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on January 18, 2018. | This Internet-Draft will expire on March 2, 2018. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 7, line 10 ¶ | skipping to change at page 7, line 10 ¶ | |||
purposes. | purposes. | |||
xTR: An xTR is a reference to an ITR or ETR when direction of data | xTR: An xTR is a reference to an ITR or ETR when direction of data | |||
flow is not part of the context description. "xTR" refers to the | flow is not part of the context description. "xTR" refers to the | |||
router that is the tunnel endpoint and is used synonymously with | router that is the tunnel endpoint and is used synonymously with | |||
the term "Tunnel Router". For example, "An xTR can be located at | the term "Tunnel Router". For example, "An xTR can be located at | |||
the Customer Edge (CE) router" indicates both ITR and ETR | the Customer Edge (CE) router" indicates both ITR and ETR | |||
functionality at the CE router. | functionality at the CE router. | |||
LISP Router: A LISP router is a router that performs the functions | LISP Router: A LISP router is a router that performs the functions | |||
of any or all of the following: ITR, ETR, Proxy-ITR (PITR), or | of any or all of the following: ITR, ETR, RTR, Proxy-ITR (PITR), | |||
Proxy-ETR (PETR). | or Proxy-ETR (PETR). | |||
EID-to-RLOC Map-Cache: The EID-to-RLOC map-cache is a short-lived, | EID-to-RLOC Map-Cache: The EID-to-RLOC map-cache is a short-lived, | |||
on-demand table in an ITR that stores, tracks, and is responsible | on-demand table in an ITR that stores, tracks, and is responsible | |||
for timing out and otherwise validating EID-to-RLOC mappings. | for timing out and otherwise validating EID-to-RLOC mappings. | |||
This cache is distinct from the full "database" of EID-to-RLOC | This cache is distinct from the full "database" of EID-to-RLOC | |||
mappings; it is dynamic, local to the ITR(s), and relatively | mappings; it is dynamic, local to the ITR(s), and relatively | |||
small, while the database is distributed, relatively static, and | small, while the database is distributed, relatively static, and | |||
much more global in scope. | much more global in scope. | |||
EID-to-RLOC Database: The EID-to-RLOC Database is a global | EID-to-RLOC Database: The EID-to-RLOC Database is a global | |||
skipping to change at page 7, line 45 ¶ | skipping to change at page 7, line 45 ¶ | |||
Recursive Tunneling: Recursive Tunneling occurs when a packet has | Recursive Tunneling: Recursive Tunneling occurs when a packet has | |||
more than one LISP IP header. Additional layers of tunneling MAY | more than one LISP IP header. Additional layers of tunneling MAY | |||
be employed to implement Traffic Engineering or other re-routing | be employed to implement Traffic Engineering or other re-routing | |||
as needed. When this is done, an additional "outer" LISP header | as needed. When this is done, an additional "outer" LISP header | |||
is added, and the original RLOCs are preserved in the "inner" | is added, and the original RLOCs are preserved in the "inner" | |||
header. Any references to tunnels in this specification refer to | header. Any references to tunnels in this specification refer to | |||
dynamic encapsulating tunnels; they are never statically | dynamic encapsulating tunnels; they are never statically | |||
configured. | configured. | |||
Re-encapsulating Tunnels: Re-encapsulating Tunneling occurs when an | Re-encapsulating Tunneling in RTRs: Re-encapsulating Tunneling | |||
ETR removes a LISP header, then acts as an ITR to prepend another | occurs when an RTR (Re-encapsulating Tunnel Router) acts like an | |||
ETR to remove a LISP header, then acts as an ITR to prepend a new | ||||
LISP header. Doing this allows a packet to be re-routed by the | LISP header. Doing this allows a packet to be re-routed by the | |||
re-encapsulating router without adding the overhead of additional | RTR without adding the overhead of additional tunnel headers. Any | |||
tunnel headers. Any references to tunnels in this specification | references to tunnels in this specification refer to dynamic | |||
refer to dynamic encapsulating tunnels; they are never statically | encapsulating tunnels; they are never statically configured. When | |||
configured. When using multiple mapping database systems, care | using multiple mapping database systems, care must be taken to not | |||
must be taken to not create re-encapsulation loops through | create re-encapsulation loops through misconfiguration. | |||
misconfiguration. | ||||
LISP Header: LISP header is a term used in this document to refer | LISP Header: LISP header is a term used in this document to refer | |||
to the outer IPv4 or IPv6 header, a UDP header, and a LISP- | to the outer IPv4 or IPv6 header, a UDP header, and a LISP- | |||
specific 8-octet header that follow the UDP header and that an ITR | specific 8-octet header that follow the UDP header and that an ITR | |||
prepends or an ETR strips. | prepends or an ETR strips. | |||
Address Family Identifier (AFI): AFI is a term used to describe an | Address Family Identifier (AFI): AFI is a term used to describe an | |||
address encoding in a packet. An address family currently | address encoding in a packet. An address family currently | |||
pertains to an IPv4 or IPv6 address. See [AFN] and [RFC3232] for | pertains to an IPv4 or IPv6 address. See [AFN] and [RFC3232] for | |||
details. An AFI value of 0 used in this specification indicates | details. An AFI value of 0 used in this specification indicates | |||
skipping to change at page 45, line 23 ¶ | skipping to change at page 45, line 23 ¶ | |||
"Locator/ID Separation Protocol (LISP) Control-Plane", | "Locator/ID Separation Protocol (LISP) Control-Plane", | |||
draft-ietf-lisp-rfc6833bis-05 (work in progress), May | draft-ietf-lisp-rfc6833bis-05 (work in progress), May | |||
2017. | 2017. | |||
[I-D.ietf-lisp-sec] | [I-D.ietf-lisp-sec] | |||
Maino, F., Ermagan, V., Cabellos-Aparicio, A., and D. | Maino, F., Ermagan, V., Cabellos-Aparicio, A., and D. | |||
Saucez, "LISP-Security (LISP-SEC)", draft-ietf-lisp-sec-12 | Saucez, "LISP-Security (LISP-SEC)", draft-ietf-lisp-sec-12 | |||
(work in progress), November 2016. | (work in progress), November 2016. | |||
[RFC0768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, | [RFC0768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, | |||
DOI 10.17487/RFC0768, August 1980, | DOI 10.17487/RFC0768, August 1980, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc768>. | editor.org/info/rfc768>. | |||
[RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, | |||
DOI 10.17487/RFC0791, September 1981, | DOI 10.17487/RFC0791, September 1981, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc791>. | editor.org/info/rfc791>. | |||
[RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., | [RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., | |||
and E. Lear, "Address Allocation for Private Internets", | and E. Lear, "Address Allocation for Private Internets", | |||
BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996, | BCP 5, RFC 1918, DOI 10.17487/RFC1918, February 1996, | |||
<http://www.rfc-editor.org/info/rfc1918>. | <https://www.rfc-editor.org/info/rfc1918>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc2119>. | editor.org/info/rfc2119>. | |||
[RFC2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within | [RFC2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within | |||
ESP and AH", RFC 2404, DOI 10.17487/RFC2404, November | ESP and AH", RFC 2404, DOI 10.17487/RFC2404, November | |||
1998, <http://www.rfc-editor.org/info/rfc2404>. | 1998, <https://www.rfc-editor.org/info/rfc2404>. | |||
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | |||
of Explicit Congestion Notification (ECN) to IP", | of Explicit Congestion Notification (ECN) to IP", | |||
RFC 3168, DOI 10.17487/RFC3168, September 2001, | RFC 3168, DOI 10.17487/RFC3168, September 2001, | |||
<http://www.rfc-editor.org/info/rfc3168>. | <https://www.rfc-editor.org/info/rfc3168>. | |||
[RFC3232] Reynolds, J., Ed., "Assigned Numbers: RFC 1700 is Replaced | [RFC3232] Reynolds, J., Ed., "Assigned Numbers: RFC 1700 is Replaced | |||
by an On-line Database", RFC 3232, DOI 10.17487/RFC3232, | by an On-line Database", RFC 3232, DOI 10.17487/RFC3232, | |||
January 2002, <http://www.rfc-editor.org/info/rfc3232>. | January 2002, <https://www.rfc-editor.org/info/rfc3232>. | |||
[RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | [RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, | |||
"Randomness Requirements for Security", BCP 106, RFC 4086, | "Randomness Requirements for Security", BCP 106, RFC 4086, | |||
DOI 10.17487/RFC4086, June 2005, | DOI 10.17487/RFC4086, June 2005, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc4086>. | editor.org/info/rfc4086>. | |||
[RFC4632] Fuller, V. and T. Li, "Classless Inter-domain Routing | [RFC4632] Fuller, V. and T. Li, "Classless Inter-domain Routing | |||
(CIDR): The Internet Address Assignment and Aggregation | (CIDR): The Internet Address Assignment and Aggregation | |||
Plan", BCP 122, RFC 4632, DOI 10.17487/RFC4632, August | Plan", BCP 122, RFC 4632, DOI 10.17487/RFC4632, August | |||
2006, <http://www.rfc-editor.org/info/rfc4632>. | 2006, <https://www.rfc-editor.org/info/rfc4632>. | |||
[RFC4868] Kelly, S. and S. Frankel, "Using HMAC-SHA-256, HMAC-SHA- | [RFC4868] Kelly, S. and S. Frankel, "Using HMAC-SHA-256, HMAC-SHA- | |||
384, and HMAC-SHA-512 with IPsec", RFC 4868, | 384, and HMAC-SHA-512 with IPsec", RFC 4868, | |||
DOI 10.17487/RFC4868, May 2007, | DOI 10.17487/RFC4868, May 2007, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc4868>. | editor.org/info/rfc4868>. | |||
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an | [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an | |||
IANA Considerations Section in RFCs", RFC 5226, | IANA Considerations Section in RFCs", RFC 5226, | |||
DOI 10.17487/RFC5226, May 2008, | DOI 10.17487/RFC5226, May 2008, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc5226>. | editor.org/info/rfc5226>. | |||
[RFC5496] Wijnands, IJ., Boers, A., and E. Rosen, "The Reverse Path | [RFC5496] Wijnands, IJ., Boers, A., and E. Rosen, "The Reverse Path | |||
Forwarding (RPF) Vector TLV", RFC 5496, | Forwarding (RPF) Vector TLV", RFC 5496, | |||
DOI 10.17487/RFC5496, March 2009, | DOI 10.17487/RFC5496, March 2009, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc5496>. | editor.org/info/rfc5496>. | |||
[RFC5944] Perkins, C., Ed., "IP Mobility Support for IPv4, Revised", | [RFC5944] Perkins, C., Ed., "IP Mobility Support for IPv4, Revised", | |||
RFC 5944, DOI 10.17487/RFC5944, November 2010, | RFC 5944, DOI 10.17487/RFC5944, November 2010, | |||
<http://www.rfc-editor.org/info/rfc5944>. | <https://www.rfc-editor.org/info/rfc5944>. | |||
[RFC6115] Li, T., Ed., "Recommendation for a Routing Architecture", | [RFC6115] Li, T., Ed., "Recommendation for a Routing Architecture", | |||
RFC 6115, DOI 10.17487/RFC6115, February 2011, | RFC 6115, DOI 10.17487/RFC6115, February 2011, | |||
<http://www.rfc-editor.org/info/rfc6115>. | <https://www.rfc-editor.org/info/rfc6115>. | |||
[RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | [RFC6275] Perkins, C., Ed., Johnson, D., and J. Arkko, "Mobility | |||
Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | Support in IPv6", RFC 6275, DOI 10.17487/RFC6275, July | |||
2011, <http://www.rfc-editor.org/info/rfc6275>. | 2011, <https://www.rfc-editor.org/info/rfc6275>. | |||
[RFC6834] Iannone, L., Saucez, D., and O. Bonaventure, "Locator/ID | [RFC6834] Iannone, L., Saucez, D., and O. Bonaventure, "Locator/ID | |||
Separation Protocol (LISP) Map-Versioning", RFC 6834, | Separation Protocol (LISP) Map-Versioning", RFC 6834, | |||
DOI 10.17487/RFC6834, January 2013, | DOI 10.17487/RFC6834, January 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6834>. | editor.org/info/rfc6834>. | |||
[RFC6836] Fuller, V., Farinacci, D., Meyer, D., and D. Lewis, | [RFC6836] Fuller, V., Farinacci, D., Meyer, D., and D. Lewis, | |||
"Locator/ID Separation Protocol Alternative Logical | "Locator/ID Separation Protocol Alternative Logical | |||
Topology (LISP+ALT)", RFC 6836, DOI 10.17487/RFC6836, | Topology (LISP+ALT)", RFC 6836, DOI 10.17487/RFC6836, | |||
January 2013, <http://www.rfc-editor.org/info/rfc6836>. | January 2013, <https://www.rfc-editor.org/info/rfc6836>. | |||
[RFC7052] Schudel, G., Jain, A., and V. Moreno, "Locator/ID | [RFC7052] Schudel, G., Jain, A., and V. Moreno, "Locator/ID | |||
Separation Protocol (LISP) MIB", RFC 7052, | Separation Protocol (LISP) MIB", RFC 7052, | |||
DOI 10.17487/RFC7052, October 2013, | DOI 10.17487/RFC7052, October 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc7052>. | editor.org/info/rfc7052>. | |||
[RFC7214] Andersson, L. and C. Pignataro, "Moving Generic Associated | [RFC7214] Andersson, L. and C. Pignataro, "Moving Generic Associated | |||
Channel (G-ACh) IANA Registries to a New Registry", | Channel (G-ACh) IANA Registries to a New Registry", | |||
RFC 7214, DOI 10.17487/RFC7214, May 2014, | RFC 7214, DOI 10.17487/RFC7214, May 2014, | |||
<http://www.rfc-editor.org/info/rfc7214>. | <https://www.rfc-editor.org/info/rfc7214>. | |||
[RFC7215] Jakab, L., Cabellos-Aparicio, A., Coras, F., Domingo- | [RFC7215] Jakab, L., Cabellos-Aparicio, A., Coras, F., Domingo- | |||
Pascual, J., and D. Lewis, "Locator/Identifier Separation | Pascual, J., and D. Lewis, "Locator/Identifier Separation | |||
Protocol (LISP) Network Element Deployment | Protocol (LISP) Network Element Deployment | |||
Considerations", RFC 7215, DOI 10.17487/RFC7215, April | Considerations", RFC 7215, DOI 10.17487/RFC7215, April | |||
2014, <http://www.rfc-editor.org/info/rfc7215>. | 2014, <https://www.rfc-editor.org/info/rfc7215>. | |||
[RFC7833] Howlett, J., Hartman, S., and A. Perez-Mendez, Ed., "A | [RFC7833] Howlett, J., Hartman, S., and A. Perez-Mendez, Ed., "A | |||
RADIUS Attribute, Binding, Profiles, Name Identifier | RADIUS Attribute, Binding, Profiles, Name Identifier | |||
Format, and Confirmation Methods for the Security | Format, and Confirmation Methods for the Security | |||
Assertion Markup Language (SAML)", RFC 7833, | Assertion Markup Language (SAML)", RFC 7833, | |||
DOI 10.17487/RFC7833, May 2016, | DOI 10.17487/RFC7833, May 2016, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc7833>. | editor.org/info/rfc7833>. | |||
[RFC7835] Saucez, D., Iannone, L., and O. Bonaventure, "Locator/ID | [RFC7835] Saucez, D., Iannone, L., and O. Bonaventure, "Locator/ID | |||
Separation Protocol (LISP) Threat Analysis", RFC 7835, | Separation Protocol (LISP) Threat Analysis", RFC 7835, | |||
DOI 10.17487/RFC7835, April 2016, | DOI 10.17487/RFC7835, April 2016, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc7835>. | editor.org/info/rfc7835>. | |||
[RFC8061] Farinacci, D. and B. Weis, "Locator/ID Separation Protocol | [RFC8061] Farinacci, D. and B. Weis, "Locator/ID Separation Protocol | |||
(LISP) Data-Plane Confidentiality", RFC 8061, | (LISP) Data-Plane Confidentiality", RFC 8061, | |||
DOI 10.17487/RFC8061, February 2017, | DOI 10.17487/RFC8061, February 2017, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc8061>. | editor.org/info/rfc8061>. | |||
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
(IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc8200>. | editor.org/info/rfc8200>. | |||
22.2. Informative References | 22.2. Informative References | |||
[AFN] IANA, "Address Family Numbers", August 2016, | [AFN] IANA, "Address Family Numbers", August 2016, | |||
<http://www.iana.org/assignments/address-family-numbers>. | <http://www.iana.org/assignments/address-family-numbers>. | |||
[CHIAPPA] Chiappa, J., "Endpoints and Endpoint names: A Proposed", | [CHIAPPA] Chiappa, J., "Endpoints and Endpoint names: A Proposed", | |||
1999, | 1999, | |||
<http://mercury.lcs.mit.edu/~jnc/tech/endpoints.txt>. | <http://mercury.lcs.mit.edu/~jnc/tech/endpoints.txt>. | |||
skipping to change at page 48, line 17 ¶ | skipping to change at page 48, line 17 ¶ | |||
RLOCs", draft-farinacci-lisp-predictive-rlocs-02 (work in | RLOCs", draft-farinacci-lisp-predictive-rlocs-02 (work in | |||
progress), May 2017. | progress), May 2017. | |||
[I-D.ietf-lisp-mn] | [I-D.ietf-lisp-mn] | |||
Farinacci, D., Lewis, D., Meyer, D., and C. White, "LISP | Farinacci, D., Lewis, D., Meyer, D., and C. White, "LISP | |||
Mobile Node", draft-ietf-lisp-mn-00 (work in progress), | Mobile Node", draft-ietf-lisp-mn-00 (work in progress), | |||
April 2017. | April 2017. | |||
[I-D.ietf-lisp-signal-free-multicast] | [I-D.ietf-lisp-signal-free-multicast] | |||
Moreno, V. and D. Farinacci, "Signal-Free LISP Multicast", | Moreno, V. and D. Farinacci, "Signal-Free LISP Multicast", | |||
draft-ietf-lisp-signal-free-multicast-04 (work in | draft-ietf-lisp-signal-free-multicast-06 (work in | |||
progress), May 2017. | progress), August 2017. | |||
[I-D.meyer-loc-id-implications] | [I-D.meyer-loc-id-implications] | |||
Meyer, D. and D. Lewis, "Architectural Implications of | Meyer, D. and D. Lewis, "Architectural Implications of | |||
Locator/ID Separation", draft-meyer-loc-id-implications-01 | Locator/ID Separation", draft-meyer-loc-id-implications-01 | |||
(work in progress), January 2009. | (work in progress), January 2009. | |||
[I-D.portoles-lisp-eid-mobility] | [I-D.portoles-lisp-eid-mobility] | |||
Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino, | Portoles-Comeras, M., Ashtaputre, V., Moreno, V., Maino, | |||
F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a | F., and D. Farinacci, "LISP L2/L3 EID Mobility Using a | |||
Unified Control Plane", draft-portoles-lisp-eid- | Unified Control Plane", draft-portoles-lisp-eid- | |||
skipping to change at page 48, line 41 ¶ | skipping to change at page 48, line 41 ¶ | |||
[LISA96] Lear, E., Tharp, D., Katinsky, J., and J. Coffin, | [LISA96] Lear, E., Tharp, D., Katinsky, J., and J. Coffin, | |||
"Renumbering: Threat or Menace?", Usenix Tenth System | "Renumbering: Threat or Menace?", Usenix Tenth System | |||
Administration Conference (LISA 96), October 1996. | Administration Conference (LISA 96), October 1996. | |||
[OPENLISP] | [OPENLISP] | |||
Iannone, L., Saucez, D., and O. Bonaventure, "OpenLISP | Iannone, L., Saucez, D., and O. Bonaventure, "OpenLISP | |||
Implementation Report", Work in Progress, July 2008. | Implementation Report", Work in Progress, July 2008. | |||
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", | [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", | |||
STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, | STD 13, RFC 1034, DOI 10.17487/RFC1034, November 1987, | |||
<http://www.rfc-editor.org/info/rfc1034>. | <https://www.rfc-editor.org/info/rfc1034>. | |||
[RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. | [RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. | |||
Traina, "Generic Routing Encapsulation (GRE)", RFC 2784, | Traina, "Generic Routing Encapsulation (GRE)", RFC 2784, | |||
DOI 10.17487/RFC2784, March 2000, | DOI 10.17487/RFC2784, March 2000, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc2784>. | editor.org/info/rfc2784>. | |||
[RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains | [RFC3056] Carpenter, B. and K. Moore, "Connection of IPv6 Domains | |||
via IPv4 Clouds", RFC 3056, DOI 10.17487/RFC3056, February | via IPv4 Clouds", RFC 3056, DOI 10.17487/RFC3056, February | |||
2001, <http://www.rfc-editor.org/info/rfc3056>. | 2001, <https://www.rfc-editor.org/info/rfc3056>. | |||
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, | [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, | |||
A., Peterson, J., Sparks, R., Handley, M., and E. | A., Peterson, J., Sparks, R., Handley, M., and E. | |||
Schooler, "SIP: Session Initiation Protocol", RFC 3261, | Schooler, "SIP: Session Initiation Protocol", RFC 3261, | |||
DOI 10.17487/RFC3261, June 2002, | DOI 10.17487/RFC3261, June 2002, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc3261>. | editor.org/info/rfc3261>. | |||
[RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic | [RFC4107] Bellovin, S. and R. Housley, "Guidelines for Cryptographic | |||
Key Management", BCP 107, RFC 4107, DOI 10.17487/RFC4107, | Key Management", BCP 107, RFC 4107, DOI 10.17487/RFC4107, | |||
June 2005, <http://www.rfc-editor.org/info/rfc4107>. | June 2005, <https://www.rfc-editor.org/info/rfc4107>. | |||
[RFC4192] Baker, F., Lear, E., and R. Droms, "Procedures for | [RFC4192] Baker, F., Lear, E., and R. Droms, "Procedures for | |||
Renumbering an IPv6 Network without a Flag Day", RFC 4192, | Renumbering an IPv6 Network without a Flag Day", RFC 4192, | |||
DOI 10.17487/RFC4192, September 2005, | DOI 10.17487/RFC4192, September 2005, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc4192>. | editor.org/info/rfc4192>. | |||
[RFC4866] Arkko, J., Vogt, C., and W. Haddad, "Enhanced Route | [RFC4866] Arkko, J., Vogt, C., and W. Haddad, "Enhanced Route | |||
Optimization for Mobile IPv6", RFC 4866, | Optimization for Mobile IPv6", RFC 4866, | |||
DOI 10.17487/RFC4866, May 2007, | DOI 10.17487/RFC4866, May 2007, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc4866>. | editor.org/info/rfc4866>. | |||
[RFC4984] Meyer, D., Ed., Zhang, L., Ed., and K. Fall, Ed., "Report | [RFC4984] Meyer, D., Ed., Zhang, L., Ed., and K. Fall, Ed., "Report | |||
from the IAB Workshop on Routing and Addressing", | from the IAB Workshop on Routing and Addressing", | |||
RFC 4984, DOI 10.17487/RFC4984, September 2007, | RFC 4984, DOI 10.17487/RFC4984, September 2007, | |||
<http://www.rfc-editor.org/info/rfc4984>. | <https://www.rfc-editor.org/info/rfc4984>. | |||
[RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support | [RFC6480] Lepinski, M. and S. Kent, "An Infrastructure to Support | |||
Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, | Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480, | |||
February 2012, <http://www.rfc-editor.org/info/rfc6480>. | February 2012, <https://www.rfc-editor.org/info/rfc6480>. | |||
[RFC6518] Lebovitz, G. and M. Bhatia, "Keying and Authentication for | [RFC6518] Lebovitz, G. and M. Bhatia, "Keying and Authentication for | |||
Routing Protocols (KARP) Design Guidelines", RFC 6518, | Routing Protocols (KARP) Design Guidelines", RFC 6518, | |||
DOI 10.17487/RFC6518, February 2012, | DOI 10.17487/RFC6518, February 2012, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6518>. | editor.org/info/rfc6518>. | |||
[RFC6831] Farinacci, D., Meyer, D., Zwiebel, J., and S. Venaas, "The | [RFC6831] Farinacci, D., Meyer, D., Zwiebel, J., and S. Venaas, "The | |||
Locator/ID Separation Protocol (LISP) for Multicast | Locator/ID Separation Protocol (LISP) for Multicast | |||
Environments", RFC 6831, DOI 10.17487/RFC6831, January | Environments", RFC 6831, DOI 10.17487/RFC6831, January | |||
2013, <http://www.rfc-editor.org/info/rfc6831>. | 2013, <https://www.rfc-editor.org/info/rfc6831>. | |||
[RFC6832] Lewis, D., Meyer, D., Farinacci, D., and V. Fuller, | [RFC6832] Lewis, D., Meyer, D., Farinacci, D., and V. Fuller, | |||
"Interworking between Locator/ID Separation Protocol | "Interworking between Locator/ID Separation Protocol | |||
(LISP) and Non-LISP Sites", RFC 6832, | (LISP) and Non-LISP Sites", RFC 6832, | |||
DOI 10.17487/RFC6832, January 2013, | DOI 10.17487/RFC6832, January 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6832>. | editor.org/info/rfc6832>. | |||
[RFC6835] Farinacci, D. and D. Meyer, "The Locator/ID Separation | [RFC6835] Farinacci, D. and D. Meyer, "The Locator/ID Separation | |||
Protocol Internet Groper (LIG)", RFC 6835, | Protocol Internet Groper (LIG)", RFC 6835, | |||
DOI 10.17487/RFC6835, January 2013, | DOI 10.17487/RFC6835, January 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6835>. | editor.org/info/rfc6835>. | |||
[RFC6837] Lear, E., "NERD: A Not-so-novel Endpoint ID (EID) to | [RFC6837] Lear, E., "NERD: A Not-so-novel Endpoint ID (EID) to | |||
Routing Locator (RLOC) Database", RFC 6837, | Routing Locator (RLOC) Database", RFC 6837, | |||
DOI 10.17487/RFC6837, January 2013, | DOI 10.17487/RFC6837, January 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6837>. | editor.org/info/rfc6837>. | |||
[RFC6935] Eubanks, M., Chimento, P., and M. Westerlund, "IPv6 and | [RFC6935] Eubanks, M., Chimento, P., and M. Westerlund, "IPv6 and | |||
UDP Checksums for Tunneled Packets", RFC 6935, | UDP Checksums for Tunneled Packets", RFC 6935, | |||
DOI 10.17487/RFC6935, April 2013, | DOI 10.17487/RFC6935, April 2013, <https://www.rfc- | |||
<http://www.rfc-editor.org/info/rfc6935>. | editor.org/info/rfc6935>. | |||
[RFC6936] Fairhurst, G. and M. Westerlund, "Applicability Statement | [RFC6936] Fairhurst, G. and M. Westerlund, "Applicability Statement | |||
for the Use of IPv6 UDP Datagrams with Zero Checksums", | for the Use of IPv6 UDP Datagrams with Zero Checksums", | |||
RFC 6936, DOI 10.17487/RFC6936, April 2013, | RFC 6936, DOI 10.17487/RFC6936, April 2013, | |||
<http://www.rfc-editor.org/info/rfc6936>. | <https://www.rfc-editor.org/info/rfc6936>. | |||
[RFC8060] Farinacci, D., Meyer, D., and J. Snijders, "LISP Canonical | [RFC8060] Farinacci, D., Meyer, D., and J. Snijders, "LISP Canonical | |||
Address Format (LCAF)", RFC 8060, DOI 10.17487/RFC8060, | Address Format (LCAF)", RFC 8060, DOI 10.17487/RFC8060, | |||
February 2017, <http://www.rfc-editor.org/info/rfc8060>. | February 2017, <https://www.rfc-editor.org/info/rfc8060>. | |||
Appendix A. Acknowledgments | Appendix A. Acknowledgments | |||
An initial thank you goes to Dave Oran for planting the seeds for the | An initial thank you goes to Dave Oran for planting the seeds for the | |||
initial ideas for LISP. His consultation continues to provide value | initial ideas for LISP. His consultation continues to provide value | |||
to the LISP authors. | to the LISP authors. | |||
A special and appreciative thank you goes to Noel Chiappa for | A special and appreciative thank you goes to Noel Chiappa for | |||
providing architectural impetus over the past decades on separation | providing architectural impetus over the past decades on separation | |||
of location and identity, as well as detailed reviews of the LISP | of location and identity, as well as detailed reviews of the LISP | |||
End of changes. 49 change blocks. | ||||
79 lines changed or deleted | 79 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |