Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

The Architecture of the Internet or Waist Watching in IP
Who Are You? Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
Technology Directions for IP Infrastructure GH 3/7/00.
1 IPv6 Unique Local Addresses Update on IETF Activity ARIN Public Policy Meeting April 2005 Geoff Huston APNIC.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Routing Items from IAB Utrecht Workshop Geoff Huston IAB.
End-to-End and Innovation Geoff Huston Chief Scientist, APNIC.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC APNIC 24, September 2007.
Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
MIF API Extension Discussion MIF IETF 78 Dapeng Liu Yuri Ismailov.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
1 IPv6 Address Distribution Mechanisms Geoff Huston APNIC.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Internet Area IPv6 Multi-Addressing, Locators and Paths.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Some Observations on CGNs Geoff Huston Chief Scientist APNIC.
What’s in a Name? Issues in Identification for Information Infrastructure Architectures Geoff Huston Research Scientist Asia Pacific Network Information.
Who Are You? Geoff Huston Identity and Location in IP.
Multiaddressing with MAST SAINT 2004, Tokyo D. Crocker Brandenburg InternetWorking SAINT 2004, Tokyo D. Crocker Brandenburg.
Technical Architectures
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Host Identity Protocol
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Bootstrap and Autoconfiguration (DHCP)
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
M3UA Patrick Sharp.
IPv4 Unallocated Address Space Exhaustion Geoff Huston Chief Scientist APNIC November 2007.
1 November 2006 in Dagstuhl, Germany
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
1 The How of Where Geoff Huston APNIC Some Observations on IPv6 Addresses.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
1 Auto-Detecting Hijacked Prefixes? Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam Geoff Huston.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems July 30, 2009 Slides presented.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Introduction to Networks
Instructor Materials Chapter 9: NAT for IPv4
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
Routing and Switching Essentials v6.0
Who Are You? Identity and Location in IP Geoff Huston APNIC.
Instructor Materials Chapter 9: NAT for IPv4
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP

Addresses and the IP Architecture Architecturally, IP Addresses are: Drawn from a Stable Global space Intended to be used in a unique context Within the IP architecture addresses are: Endpoint identifiers Routing objects Key value for Forwarding Lookup

IP Addresses are: A means of uniquely identifying a device interface that is attached to a network Endpoint identifier A means of identifying where a device is located within a network Location identifier A lookup key into a forwarding table to make local switching decisions Forwarding identifier This deliberate overload of semantic intent has been a basic property of the IP architecture

Challenges to the IP Address Model Roaming endpoints - Nomadism Mobile endpoints – Home and Away Mobile Networks Session hijacking and disruption Multi-homed endpoints and session resiliency Scoped address realms NATs and ALGs VOIP Peer-to-Peer applications Routing Complexity and Scaling Middleware, DNS and Renumbering

Wouldnt it be good if….. Your identity was stable - irrespective of your location You could maintain sessions while being mobile You could maintain sessions across changes in local connectivity That locator use was dynamic while identity was long-term stable Anyone could reach you anytime, anywhere You could reach anyone, anytime, anywhere

Wouldnt if be good if… IPv6 offered solutions in this space that allowed endpoint identity to be distinguished from location and forwarding functions Second-Comer Syndrome: This perspective can be phrased as: Unless IPv6 directly tackles some of the fundamental issues that have caused IPv4 to enter into highly complex solution spaces that stress various aspects of the deployed environment than Im afraid that weve achieved very little in terms of actual progress in IPv6. Reproducing IPv4 with larger locator identifiers is not a major step forward – its just a small step sideways! Weve Been Here Before Warning: Of course this burdens the IPv6 effort in attempting to find solutions to quite complex networking issues that have proved, over many years of collective effort, to be intractable in IPv4. If the problem was hard in an IPv4 context it does not get any easier in IPv6! That should not stop further exploration of the space, but it should add a touch of caution to evaluation of solutions in this space.

What do we want from Identity? Varying degrees of: Uniqueness Persistence Structure Clear Scope of Applicability Validity and Authenticity Clear line of derivation authority Identity is not a unilateral assertion – it is better viewed as a recognition of derived uniqueness within a commonly understood context

So far we have: Mobile IPv4 Mobile Ipv6 AD Hoc Networking NEMO HIP SCTP SHIM6 Teredo Dynamic DNS NAPTR and SNAPTR DNS RRs

Choices, Choices, Choices Its possible to inject an identity object at almost any level of the protocol stack model Application Identities shared across transport sessions Transport Identities to allow agility of stack location Host identities to allow agility of location of all hosted sessions In this context an identity is a token to allow multiple locators to be recognised as belonging to a single communication state at both (or multiple) ends of the communication

Choices, Choices, Choices Identity at the Application level Use a stable name space that is mapped to a locator (using the DNS) DNS dynamic incremental updates Allow indirection and referral via DNS NAPTR records Generic identity ornamented with service-specific mappings ENUM Use application agents to provide stable rendezvous points For example: Issues: Can the DNS support dynamic interaction at a suitable scale and speed? Are a family of diverse application-specific identities desireable (cross- application referral and hand-over) Can we stop application designers from creating NAT-agile locator- independent application-specific solutions that rely on an application-specific identity space?

Choices, Choices, Choices Identity at the Transport Level Can we provide a mechanism to allow identity / locator independence at the session level? An application opens a session with a generated session identity token The identity token is dynamically associated with locator pairs Changes in locators do not change the session token Application of the layering approach Allow applications to assume a framework of identity association Perform identity / locator association at a lower level of the protocol stack Use opportunistic identity values that have a limited context and role of supporting session integrity Support legacy applications by providing a consistent API

Choices, Choices, Choices Identity at the IP level Can we provide an identity / locator association that is shared across multiple sessions? Reduce the overhead of identity locator mappings to allow all sessions to a common endpoint to share a mapping state Want to provide a more comprehensive support of identity to support both session-oriented transport protocols and (potentially) datagram transactions Reduce the complexity of applications and transport sessions and place the per-endpoint mapping state in the IP level

Identity Issues How could an identity mapping function? IP Identity Transport ULP IP Identity Transport ULP Connect to server.apnic.net Connect to id: id: :360::1 Packet to 2001:360::1

How could an identity mapping function? Identity Issues IP Identity Transport ULP IP Identity Transport ULP Connect to server.apnic.net Connect to id: id: :ffff::1 Packet to 2001:ffff::1 Change of locator

Identity Implementations Conventional Add a wrapper around the upper level protocol data unit and communicate with the peer element using this in band space IP Header Identity Field Transport Header Payload IP Identity Transport ULP

Identity Implementations Out of Band Use distinct protocol to allow the protocols element to exchange information with its peer IP Identity Transport ULP IP Identity Transport ULP Identity Peering Protocol Transport Protocol

Identity Implementations Application Identity: Above the Session IP Identity Transport ULP IP Identity Transport ULP Identity Peering Protocol Transport Protocol Transport

Identity Implementations Referential Use a reference to a third party point as a means of peering (e.g. DNS Identifier) IP Identity Transport ULP IP Identity Transport ULP Transport Protocol DNS

Identity Implementations Self-Referential Use an opportunistic identity as an equivalence token for a collection of locators IP Identity Transport ULP IP Identity Transport ULP Transport Session Identity Token Exchange Locator Pair A Locator Pair B Locator Pair C

Identity Types Use identity tokens lifted from a protocols address space DNS, Appns, Transport manipulate a distinguished address IP functions on locators New Protocol Stack element performs mapping FQDN as the identity token Is this creating a circular dependency? Does this impose unreasonable demands on the properties of the DNS? Structured token What would be the unique attribute of a new token space that distinguishes it from the above? Unstructured token Allows for self-allocation of identity tokens that may not globally assuredly unique (opportunistic tokens) How to map from identity tokens to locators using a lookup service? Or how to avoid undertaking such a mapping function

Some Identity Suggestions IPv4 Address Centrally Assigned IPv6 Unique Local Addresses A crypto hash of your public key A crypto hash of a set of locator values The IPv6 address used to initiate the communication IPv6 Address DNS names URIs Telephone numbers

Identity Issues Identity / Locator Binding domain Session or host? Dynamic or static? Configured or negotiated? Scope of identity role Locator independent identity Equivalence binding for multiple locators Locator Selection Application visibility of identity capability Scoped identities Identity Referrals and hand-overs Third party locator rewriting Security of the binding Context of use determining semantic interpretation

Upper Level Issues of Identity Realms The significant effort and cost of supporting a new global unique token distribution system as an endpoint identity system Uniqueness is not cheap! The side-effects of reusing some other existing token set as an identity set Recycling is dangerous! The issue of support of dynamic identity to locator binding Speed vs accuracy The protocol overhead of identity handshake for datagram transactions The security issues in maintaining integrity of identity

IPv6 and Identity Is the 64bit Interface Identifier a rich location for carrying opportunistic identity? Can the Flow-Id field be exploited? Are header extensions and options useful? Is packet inflation necessary? Is IPv6 the only protocol for consideration of IP level identity approaches? Is there any leverage for transport session approaches? Can such approaches be IP version agnostic?

* Our current direction appears to be developing solutions in all of these spaces simultaneously: Multi-Party Applications Application Agents Rendezvous protocols DNS Incremental Updates and DNSSEC DNS Indirection and Referral SCTP, HIP at the transport-layer Shim6 Mobile IPv6 Mobile IPv4 And probably many more! * Let a hundred flowers bloom: let a hundred schools of thought contend Mao Zedong, 1956

* Should there be just one SINGLE identity model? Can we coerce all the requirements of identification into a single identity realm? Or are the various desireable properties of identity so mutually contradictory that there is no single solution? Many of the approaches weve see assume a single identity mapping function that wants to ignore any side effects from any other simultaneous identity scheme in operation One the other hand, retrofitting any form of identity function into todays IP architecture is bad enough in terms of legacy requirements without having to factor in other identity functions as well! * Let one flower bloom: let one school of thought prevail

Where Now? We appear to have a lot more to learn here Its more than scaling routing or avoiding renumbering or multihoming Its more than IPv4 and IPv6 If we want a more agile and flexible model of packet networking to support diverse communications environments and services then we need to understand how split apart the semantics of who wants to talk from the mechanics of how they may talk

Thank You