I have reviewed this document.

In general, it is well written and almost ready to go forward. There are a 
couple of areas that need further text, however. The main issue is a clear 
description of the to-experiment and problematic areas of LISP interworking. 
(Making those is also needed in order to get the document approved, based on 
experience of taking the other Lisp documents to the IESG.) Another issue is 
that I think the security considerations text needs work.

In moder detail:

Technical issue: As with the other documents from the group, Section 1 should 
include a high-level explanation of what issues are uncertain, potentially 
problematic, or worth experimenting on. For instance, I presume you should say 
something about the effects of having to NAT traffic, finding deployment 
motivations to set up proxy ITRs, possible inclusion of too much non-aggregated 
EID space in the DFZ, effects of the asymmetric PITR routing, and so on.

Please suggest text.

An ITR can also know explicitly that the
destination is non-LISP if the destination IP address matches a
Negative Map Reply found in its Map Cache.

Technical issue: This is normally the case, but the text seems to avoid going 
into the details that I think are relevant in this case. The base spec says

   There are two primary applications for
   Negative Map-Replies.  The first is for a Map-Resolver to instruct an
   ITR or PITR when a destination is for a LISP site versus a non-LISP
   site.  And the other is to source quench Map-Requests which are sent
   for non-allocated EIDs.

and

    The actions defined are used by an ITR or PITR when a
    destination EID matches a negative mapping cache entry.
    Unassigned values should cause a map-cache entry to be created
    and, when packets match this negative cache entry, they will be
    dropped.  The current assigned values are:

      (0) No-Action:  The map-cache is kept alive and no packet
         encapsulation occurs.

      (1) Natively-Forward:  The packet is not encapsulated or dropped
         but natively forwarded.

      (2) Send-Map-Request:  The packet invokes sending a Map-Request.

      (3) Drop:  A packet that matches this map-cache entry is dropped.
         An ICMP Unreachable message SHOULD be sent.

That is, first of all there are other situations for which negative map cache 
entries are used (but it is probably fine to route to the Internet in those 
cases). Secondly, there are some controls on whether native forwarding is the 
appropriate action.

Can you add a note about these and/or reformulate the text a bit?

    3.  In either of the two exceptions mentioned above there could be


Editorial issue: I was unsure what "the two exceptions mentioned above" refer to. Also, your list 
starts with "This can be achieved by using one of two mechanisms:", so it is odd to find three 
items in the list. I would suggest making this paragraph a regular paragraph and not a numbered item, and 
starting it with "In either of the two mechanisms listed above there could be ...".

5.  Proxy Ingress Tunnel Routers

Editorial issue: It may be too obvious perhaps, but I think this section should 
state up front that highly aggregated EID space advertisement implies an entity 
that routes on the behalf of many LISP sites.

    240.0.0.0/24.  For the purposes of this example, this prefix and no


Editorial issue: Is there a reason why we are using 240 addresses as examples? 
I'd prefer using normal example addresses or 10/8 addresses if you need shorter 
prefixes...

For the purposes of this example, this prefix and no
covering aggregate is present in the global routing system.

Editorial issue: Shouldn't this be "... neither this prefix or any covering 
aggregate are present ...". The way that you have written it now had me confused for 
a moment, thinking that this prefix is present but no covering prefix is present. I don't 
think that is what you mean.


    6 <http://tools.ietf.org/html/draft-ietf-lisp-interworking-02#section-6>. 
LISP-NAT




Technical issue: Section 6 should probably point to some BEHAVE WG RFCs on how 
the NAT operation should technically work.

An example of this translation follows.  For this example, a site has
been assigned a LISP-NR EID of 220.1.1.0/24.  In order to utilize
LISP-NAT, the site has also been provided the PA EID of
128.200.1.0/24, and uses the first address (128.200.1.1) as the
site's RLOC.  The rest of this PA space (128.200.1.2 to
128.200.1.254) is used as a translation pool for this site's hosts
who need to send packets to non-LISP hosts.


Editorial issue: Please use the officially allocated example addresses.


      6.4 
<http://tools.ietf.org/html/draft-ietf-lisp-interworking-02#section-6.4>. 
LISP-NAT and multiple EIDs



    When a site has two addresses that a host might use for global
    reachability, care must be chosen on which EID is found in DNS.  For
    example, whether applications such as DNS use the LISP-R EID or the
    LISP-NR EID.  This problem exists for NAT in general, but the
    specific issue described above is unique to LISP.  Using PITRs can
    mitigate this problem, since the LISP-NR EID can be reached in all
    cases.

Technical issue: but if you had a PITR, you would not need LISP-NAT, or am I 
missing something?


      6.5 
<http://tools.ietf.org/html/draft-ietf-lisp-interworking-02#section-6.5>. When 
LISP-NAT and PITRs used by the same LISP Site



    With LISP-NAT, there are two EIDs possible for a given host, the
    LISP-R EID and the LISP-NR EID.  When a site has two addresses that a
    host might use for global reachability, name-to-address directories
    may need to be modified.

    This problem, global vs. local addressability, exists for NAT in
    general, but the specific issue described above is unique to
    location/identity separation schemes.  Some of these have suggested
    running a separate DNS instance for new types of EIDs.  This solves
    the problem but introduces complexity for the site.  Alternatively,
    using PITRs can mitigate this problem, because the LISP-NR EID can be
    reached in all cases.

Editorial issue: what's the difference between Sections 6.4 and 6.5? It seems 
that they both talk about the problem of two addresses in a name mapping system.

Technical issue: I don't think "introduces complexity for the site" begins to 
explain the type of problems caused by having to separate naming systems from each other. 
Please expand or otherwise highlight that this approach is problematic.


    8 <http://tools.ietf.org/html/draft-ietf-lisp-interworking-02#section-8>. 
Discussion of Proxy ITRs (PITRs), LISP-NAT, and Proxy-ETRs (PETRs)



  In summary, there are three mechanisms for interworking LISP with
  non-LISP Sites (for both IPv4 and IPv6).  In the LISP-NAT option the
  LISP site can manage and control the interworking on its own.  In the
  PITR case, the site is not required to manage the advertisement of
  it's EID prefix into the DFZ, with the cost of potentially adding
  stretch to the connections of non-LISP sites sending packets to the
  LISP site.  The third option is Proxy-ETRs, which are optionally used
  by sites relying on PITRs case to mitigate two caveats for LISP sites
  sending packets to non-LISP sites.  This means Proxy-ETRs are not
  usually expected to be deployed by themselves, rather they will be
  used to assist LISP-NR sites which are already using PITRs.


Technical issue: This paragraph and Setion 8 in general would greatly from a 
discussion of the tradeoffs involved in these three mechanisms. Just one 
downside, stretch, is mentioned above. But I think there are others... impacts 
to naming systems, asymmetric traffic, etc. Please expand.

9. Security Considerations

Technical issue: This section seems a bit thin. I'd love to see a discussion of 
the following additional issues:

Implications to firewalls? Are there any? What about asymmetric routing?

Are there Denial-of-service attacks on PITRs and PETRs?

Are there DNSSEC implications on the naming system implications?

    Like any router or LISP ITR, PITRs will have the opportunity to
    inspect traffic at the time that they encapsulate.  The location of
    these devices in the network can have implications for discarding
    malicious traffic on behalf of ETRs which request this behavior (via
    the drop action bit in Map-Reply packets for an EID or EID prefix).


You should also talk about these devices being trusted to route your traffic to 
begin with, and how both non-Lisp and Lisp networks should be careful in not 
peering with untrustworthy networks. This is very similar to, say, peering with 
someone who says they can reach everything in the Internet but in reality their 
quality or security leaves something to be desired.

(Of course, all additions to the security considerations text could be pointers 
elsewhere, if the issues have already been noted in other documents.)

Jari

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to