1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
|
Internet Engineering Task Force (IETF) A. Rodriguez-Natal
Request for Comments: 9437 Cisco
Category: Standards Track V. Ermagan
ISSN: 2070-1721 Google
A. Cabellos
UPC/BarcelonaTech
S. Barkai
Nexar
M. Boucadair
Orange
August 2023
Publish/Subscribe Functionality for the Locator/ID Separation Protocol
(LISP)
Abstract
This document specifies an extension to the Locator/ID Separation
Protocol (LISP) control plane to enable Publish/Subscribe (PubSub)
operation.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9437.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Scope of Applicability
2. Terminology and Requirements Notation
3. Deployment Requirements
4. Map-Request PubSub Additions
5. Mapping Request Subscribe Procedures
6. Mapping Notification Publish Procedures
7. Security Considerations
7.1. Security Association between ITR and Map-Server
7.2. DDoS Attack Mitigation
8. IANA Considerations
9. References
9.1. Normative References
9.2. Informative References
Appendix A. Sample PubSub Deployment Experiences
A.1. PubSub as a Monitoring Tool
A.2. Mitigating Negative Map-Cache Entries
A.3. Improved Mobility Latency
A.4. Enhanced Reachability with Dynamic Redistribution of
Prefixes
A.5. Better Serviceability
Acknowledgments
Contributors
Authors' Addresses
1. Introduction
The Locator/ID Separation Protocol (LISP) [RFC9300] [RFC9301] splits
IP addresses into two different namespaces: Endpoint Identifiers
(EIDs) and Routing Locators (RLOCs). LISP uses a map and encapsulate
(a.k.a., map-and-encap) approach that relies on (1) a Mapping System
(basically a distributed database) that stores and disseminates EID-
RLOC mappings and on (2) LISP Tunnel Routers (xTRs) that encapsulate
and decapsulate data packets based on the content of those mappings.
Ingress Tunnel Routers (ITRs), Re-encapsulating Tunnel Routers
(RTRs), and Proxy Ingress Tunnel Routers (PITRs) pull EID-to-RLOC
mapping information from the Mapping System by means of an explicit
request message. Section 6.1 of [RFC9301] indicates how Egress
Tunnel Routers (ETRs) can tell ITRs/RTRs/PITRs about mapping changes.
This document presents a Publish/Subscribe (PubSub) extension in
which the Mapping System can notify ITRs/RTRs/PITRs about mapping
changes. When this mechanism is used, mapping changes can be
notified faster and can be managed in the Mapping System versus the
LISP sites.
In general, when an ITR/RTR/PITR wants to be notified for mapping
changes for a given EID-Prefix, the following main steps occur:
1. The ITR/RTR/PITR builds a Map-Request for that EID-Prefix with
the Notification-Requested bit (N-bit) set and that also includes
its xTR-ID and Site-ID.
2. The Map-Request is forwarded to one of the Map-Servers that the
EID-Prefix is registered to.
3. The Map-Server creates subscription state for the ITR/RTR/PITR on
the EID-Prefix.
4. The Map-Server sends a Map-Notify to the ITR/RTR/PITR to confirm
that the subscription has been created and then waits for an
acknowledgement of the notification.
5. The ITR/RTR/PITR sends back a Map-Notify-Ack to acknowledge the
successful receipt of the Map-Notify.
6. When there is a change in the mapping of the EID-Prefix, the Map-
Server sends a Map-Notify message to each ITR/RTR/PITR in the
subscription list.
7. Each ITR/RTR/PITR sends a Map-Notify-Ack to acknowledge the
received Map-Notify.
This operation is repeated for all EID-Prefixes for which ITRs/RTRs/
PITRs want to be notified. An ITR/RTR/PITR can set the N-bit for
several EID-Prefixes within a single Map-Request. Please note that
the steps above illustrate only the simplest scenario and that
details for this and other scenarios are described later in the
document.
The reader may refer to [FLOW-EXAMPLES] for sample flows to
illustrate the use of the PubSub specification.
1.1. Scope of Applicability
The PubSub procedure specified in this document is intended for use
in contexts with controlled access to the Map-Server. How a
deployment controls access to a Map-Server is deployment specific and
therefore out of the scope of this document. However, the Map-
Resolvers and Map-Servers need to be configured with the required
information to ensure at least the following:
1. Map-Resolvers MUST verify that an xTR is allowed to (1) set the
N-bit to 1 and (2) use the xTR-ID, Site-ID, and ITR-RLOCs
included in a Map-Request.
2. Map-Servers MUST only accept subscription requests from Map-
Resolvers that verify Map-Requests as previously described.
2. Terminology and Requirements Notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
The document uses the terms defined in Section 3 of [RFC9300].
3. Deployment Requirements
In addition to the general assumptions and expectations that
[RFC9301] makes for LISP deployments, this document imposes the
following deployment requirements:
1. A unique 128-bit xTR-ID (plus a 64-bit Site-ID) identifier is
assigned to each xTR.
2. Map-Servers are configured to proxy Map-Replying (i.e., they are
solicited to generate and send Map-Reply messages) for the
mappings they are serving.
3. A security association (e.g., a PubSubKey) is required between
the ITRs and the Map-Servers (see Section 7.1).
If a requirement is not met, a subscription cannot be established,
and the network will continue operating without this enhancement.
The configuration of xTR-IDs and Site-IDs is out of the scope of this
document. The reader may refer to [LISP-YANG] for an example of how
these identifiers can be provisioned to LISP nodes.
4. Map-Request PubSub Additions
Figure 1 shows the format of the updated Map-Request to support the
PubSub functionality. In particular, this document associates a
meaning with one of the reserved bits (see Section 8).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Type=1 |A|M|P|S|p|s|R|I| Rsvd |L|D| IRC | Record Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Nonce . . . |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| . . . Nonce |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source-EID-AFI | Source EID Address ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ITR-RLOC-AFI 1 | ITR-RLOC Address 1 ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ITR-RLOC-AFI n | ITR-RLOC Address n ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ |N| Reserved | EID mask-len | EID-Prefix-AFI |
Rec +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
\ | EID-Prefix ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Map-Reply Record ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ xTR-ID +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Site-ID +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: Map-Request with I-bit, N-bit, xTR-ID, and Site-ID
The following is added to the Map-Request message defined in
Section 5.2 of [RFC9301]:
xTR-ID bit (I-bit): This bit is set to 1 to indicate that 128-bit
xTR-ID and 64-bit Site-ID fields are present in the Map-Request
message. For PubSub operation, an xTR MUST be configured with an
xTR-ID and Site-ID, and it MUST set the I-bit to 1 and include its
xTR-ID and Site-ID in the Map-Request messages it generates. If
the I-bit is set but the Site-ID and/or xTR-ID are not included, a
receiver can detect the error because, after processing that last
EID-Record, there are no bytes left from processing the message.
In this case, the receiver SHOULD log a malformed Map-Request and
MUST drop the message.
Notification-Requested bit (N-bit): The N-bit of an EID-Record is
set to 1 to specify that the xTR wants to be notified of updates
for that EID-Prefix.
xTR-ID field: If the I-bit is set, this field is added to the Map-
Request message as shown in Figure 1, starting right after the
final Record in the message (or the Map-Reply Record, if present).
The xTR-ID is specified in Section 5.6 of [RFC9301].
Site-ID field: If the I-bit is set, this field is added to the Map-
Request message as shown in Figure 1, following the xTR-ID field.
The Site-ID is defined in Section 5.6 of [RFC9301].
5. Mapping Request Subscribe Procedures
The xTR subscribes for changes to a given EID-Prefix by sending a
Map-Request to the Mapping System with the N-bit set on the EID-
Record. The xTR builds a Map-Request according to Section 5.3 of
[RFC9301] and also does the following:
1. The xTR MUST set the I-bit to 1 and append its xTR-ID and Site-ID
to the Map-Request.
2. The xTR MUST set the N-bit to 1 for the EID-Record to which the
xTR wants to subscribe.
3. If the xTR has a nonce associated with the EID-Prefix, it MUST
use this nonce increased by one in the Map-Request. Otherwise,
it generates a nonce as described in Section 5.2 of [RFC9301].
It is RECOMMENDED that the xTR use persistent storage to keep
nonce state. If the xTR does not have persistent storage and
does not have a nonce associated with the EID-Prefix, it MUST
reset the nonce by using the procedure described in Section 7.1
to successfully create a new security association with the Map-
Server.
The Map-Request is forwarded to the appropriate Map-Server through
the Mapping System. This document does not assume that a Map-Server
is pre-assigned to handle the subscription state for a given xTR.
The Map-Server that receives the Map-Request will be the Map-Server
responsible for notifying that specific xTR about future mapping
changes for the subscribed mapping records.
Upon receipt of the Map-Request, the Map-Server processes it as
described in Section 8.3 of [RFC9301]. In addition, unless the xTR
is using the procedure described in Section 7.1 to create a new
security association, the Map-Server MUST verify that the nonce in
the Map-Request is greater than the stored nonce (if any) associated
with the xTR-ID (and EID-Prefix, when applicable). Otherwise, the
Map-Server MUST silently drop the Map-Request message and SHOULD log
the event to record that a replay attack could have occurred.
Furthermore, upon processing, for the EID-Record that has the N-bit
set to 1, the Map-Server proceeds to add the xTR-ID contained in the
Map-Request to the list of xTRs that have requested to be subscribed
to that EID-Prefix.
If an xTR-ID is successfully added to the list of subscribers for an
EID-Prefix, the Map-Server MUST extract the nonce and ITR-RLOCs
present in the Map-Request and store the association between the EID-
Prefix, xTR-ID, ITR-RLOCs, and nonce. Any state that is already
present regarding ITR-RLOCs and/or nonce for the same xTR-ID MUST be
overwritten. When the LISP deployment has a single Map-Server, the
Map-Server can be configured to keep a single nonce per xTR-ID for
all EID-Prefixes (when used, this option MUST be enabled at the Map-
Server and all xTRs).
If the xTR-ID is added to the list, the Map-Server MUST send a Map-
Notify message back to the xTR to acknowledge the successful
subscription. The Map-Server builds the Map-Notify according to
Sections 5.5 and 5.7 of [RFC9301] with the following considerations:
1. The Map-Server MUST use the nonce from the Map-Request as the
nonce for the Map-Notify.
2. The Map-Server MUST use its security association with the xTR
(Section 7.1) to sign the authentication data of the Map-Notify.
The xTR MUST use the security association to verify the received
authentication data.
3. The Map-Server MUST send the Map-Notify to one of the ITR-RLOCs
received in the Map-Request (which one is implementation
specific).
As a reminder, the initial transmission and retransmission of Map-
Notify messages by a Map-Server follow the procedure specified in
Section 5.7 of [RFC9301]. Some state changes may trigger an overload
that would impact, e.g., the outbound capacity of a Map-Server. A
similar problem may be experienced when a large number of state
entries are simultaneously updated. To prevent such phenomena, Map-
Servers SHOULD be configured with policies to control the maximum
number of subscriptions and also the pace of Map-Notify messages.
For example, the Map-Server may be instructed to limit the resources
that are dedicated to unsolicited Map-Notify messages to a small
fraction (e.g., less than 10%) of its overall processing and
forwarding capacity. The exact details to characterize such policies
are deployment and implementation specific. Likewise, this document
does not specify which notifications take precedence when these
policies are enforced.
When the xTR receives a Map-Notify with a nonce that matches one in
the list of outstanding Map-Request messages sent with an N-bit set,
it knows that the Map-Notify is to acknowledge a successful
subscription. The xTR processes this Map-Notify, as described in
Section 5.7 of [RFC9301] and MUST use the Map-Notify to populate its
Map-Cache with the returned EID-Prefix and RLOC-set. As a reminder,
following Section 5.7 of [RFC9301], the xTR has to send a Map-Notify-
Ack back to the Map-Server. If the Map-Server does not receive the
Map-Notify-Ack after exhausting the Map-Notify retransmissions
described in Section 5.7 of [RFC9301], the Map-Server can remove the
subscription state. If the Map-Server removes the subscription
state, and absent explicit policy, it SHOULD notify the xTR by
sending a single Map-Notify with the same nonce but with Loc-Count =
0 (and Loc-AFI = 0) and ACT bits set to 5 "Drop/Auth-Failure". It is
OPTIONAL for the xTR to update its Map-Cache entry for the EID-Prefix
(if any) based on this Map-Notify. This message is specifically
useful for cases where Map-Notifies are successfully received by an
xTR, but the corresponding Map-Notify-Acks are lost when forwarded to
the Map-Server. xTR implementations can use this signal to try to
reinstall their subscription state instead of maintaining stale
mappings.
The subscription of an xTR-ID may fail for a number of reasons. For
example, it fails because of local configuration policies (such as
accept and drop lists of subscribers), because the Map-Server has
exhausted the resources to dedicate to the subscription of that EID-
Prefix (e.g., the number of subscribers excess the capacity of the
Map-Server), or because the xTR was not successful tried but was not
successful in establishing a new security association (Section 7.1).
If the subscription request fails, the Map-Server sends a Map-Reply
to the originator of the Map-Request, as described in Section 8.3 of
[RFC9301], with the following considerations:
* If the subscription request fails due to policy (e.g., for
explicitly configured subscriptions, as described later in this
section), the Map-Server MUST respond to the Map-Request with a
Negative Map-Reply (Loc-Count = 0 and Loc-AFI = 0) with ACT bits
set to 4 "Drop/Policy-Denied".
* If the subscription request fails due to authentication (e.g.,
when a new security association is being established, as described
in Section 7.1), the Map-Server MUST respond to the Map-Request
with a Negative Map-Reply (Loc-Count = 0 and Loc-AFI = 0) with ACT
bits set to 5 "Drop/Auth-Failure".
* If the subscription request fails due to any other reason, the
Map-Server MUST follow Section 8.3 of [RFC9301] with no changes.
The xTR processes any Map-Reply or Negative Map-Reply as specified in
Section 8.1 of [RFC9301], with the following considerations: if the
xTR receives a Negative Map-Reply with ACT bits set to 4 "Drop/
Policy-Denied" or 5 "Drop/Auth-Failure" as a response to a
subscription request, it is OPTIONAL for the xTR to update its Map-
Cache entry for the EID-Prefix (if any). If the subscription request
fails (for whichever reason), it is up to the implementation of the
xTR to try to subscribe again.
If the Map-Server receives a subscription request for an EID-Prefix
not present in the mapping database, it SHOULD follow the same logic
described in Section 8.4 of [RFC9301] and create a temporary
subscription state for the xTR-ID to the least specific prefix that
both matches the original query and does not match any EID-Prefix
known to exist in the LISP-capable infrastructure. Alternatively,
the Map-Server can determine that such a subscription request fails
and send a Negative Map-Reply following Section 8.3 of [RFC9301]. In
both cases, the TTL of the temporary subscription state or the
Negative Map-Reply SHOULD be configurable, with a value of 15 minutes
being RECOMMENDED.
The subscription state can also be created explicitly by
configuration at the Map-Server (possible when a pre-shared security
association exists, see Section 7) using a variety of means that are
outside the scope of this document. If there is no nonce that can be
used for the explicit subscription state at the time the explicit
subscription is configured (e.g., from a different subscription
already established with the same xTR when a single nonce is kept per
xTR-ID), then both the xTR and Map-Server MUST be configured with the
initial nonce. RECOMMENDED to have a configuration option to enable
(or disable) the xTR to accept publication information for EID-
Prefixes that the xTR did not explicitly subscribe to. By default,
the xTR is allowed to modify explicitly configured subscription state
following the procedures described in this section; however, this MAY
be disabled at the Map-Server via configuration. If the Map-Server
is instructed to not allow xTRs to modify explicitly configured
subscriptions, and an xTR tries to do so, this triggers a Negative
Map-Reply with ACT bits set to 4 "Drop/Policy-Denied" as described
earlier in this section.
The following specifies the procedure to remove a subscription:
* If a valid Map-Request with the N-bit set to 1 only has one ITR-
RLOC with AFI = 0 (i.e., Unknown Address), the Map-Server MUST
remove the subscription state for that xTR-ID (unless this is
disabled via configuration, see previous paragraph).
* If the subscription state is removed, the Map-Server MUST send a
Map-Notify to the source RLOC of the Map-Request.
* If the subscription removal fails due to configuration, this
triggers a Negative Map-Reply with ACT bits set to 4 "Drop/Policy-
Denied" as described earlier in this section; the Map-Server sends
the Negative Map-Reply to the source RLOC of the Map-Request in
this case.
* Removing subscription state at the Map-Server can lead to replay
attacks. To soften this, the Map-Server SHOULD keep the last
nonce seen per xTR-ID (and EID-Prefix, when applicable).
* If the Map-Server does not keep the last nonces seen, then the
Map-Server MUST require the xTRs to subscribe using the procedure
described in Section 7.1 to create a new security association with
the Map-Server.
If the Map-Server receives a Map-Request asking to remove a
subscription for an EID-Prefix without subscription state for that
xTR-ID and the EID-Prefix is covered by a less-specific EID-Prefix
for which subscription state exists for the xTR-ID, the Map-Server
SHOULD stop publishing updates about this more-specific EID-Prefix to
that xTR until the xTR subscribes to the more-specific EID-Prefix.
The same considerations regarding authentication, integrity
protection, and nonce checks, which are described in this section and
Section 7 for Map-Requests used to update subscription state, apply
for Map-Requests used to remove subscription state.
When an EID-Prefix is removed from the Map-Server (either when
explicitly withdrawn or when its TTL expires), the Map-Server
notifies its subscribers (if any) via a Map-Notify with TTL equal to
0.
6. Mapping Notification Publish Procedures
The publish procedure is implemented via Map-Notify messages that the
Map-Server sends to xTRs. The xTRs acknowledge the receipt of Map-
Notifies by sending Map-Notify-Ack messages back to the Map-Server.
The complete mechanism works as follows:
When a mapping stored in a Map-Server is updated (e.g., via a Map-
Register from an ETR), the Map-Server MUST notify the subscribers of
that mapping via sending Map-Notify messages with the most up to date
mapping information. If subscription state in the Map-Server exists
for a less-specific EID-Prefix and a more-specific EID-Prefix is
updated, then the Map-Notify is sent with the more-specific EID-
Prefix mapping to the subscribers of the less-specific EID-Prefix
mapping. The Map-Notify message sent to each of the subscribers as a
result of an update event follows the encoding and logic defined in
Section 5.7 of [RFC9301] for Map-Notify, except for the following:
1. The Map-Notify MUST be sent to one of the ITR-RLOCs associated
with the xTR-ID of the subscriber (which one is implementation
specific).
2. The Map-Server increments the nonce by one every time it sends a
Map-Notify as publication to an xTR-ID for a particular EID-
Prefix.
3. The Map-Server MUST use its security association with the xTR to
compute the authentication data of the Map-Notify.
When the xTR receives a Map-Notify with an EID that is not local to
the xTR, the xTR knows that the Map-Notify is to update an entry on
its Map-Cache. The xTR MUST keep track of the last nonce seen in a
Map-Notify received as a publication from the Map-Server for the EID-
Prefix. When the LISP deployment has a single Map-Server, the xTR
can be configured to keep track of a single nonce for all EID-
Prefixes (when used, this option MUST be enabled at the Map-Server
and all xTRs). If a Map-Notify that is received as a publication has
a nonce value that is not greater than the saved nonce, the xTR drops
the Map-Notify message and logs the fact a replay attack could have
occurred. The same considerations discussed in Section 5.6 of
[RFC9301] regarding Map-Register nonces apply here for Map-Notify
nonces.
The xTR processes the received Map-Notify as specified in Section 5.7
of [RFC9301], with the following considerations:
* The xTR MUST use its security association with the Map-Server
(Section 7.1) to validate the authentication data on the Map-
Notify.
* The xTR MUST use the mapping information carried in the Map-Notify
to update its internal Map-Cache.
* If after following Section 5.7 of [RFC9301] regarding
retransmission of Map-Notify messages, the Map-Server has not
received the Map-Notify-Ack, it can try sending the Map-Notify to
a different ITR-RLOC for that xTR-ID.
* If the Map-Server tries all the ITR-RLOCs without receiving a
response, it may stop trying to send the Map-Notify.
7. Security Considerations
Generic security considerations related to LISP control messages are
discussed in Section 9 of [RFC9301].
In the particular case of PubSub, cache poisoning via malicious Map-
Notify messages is avoided by the use of nonce and the security
association between the ITRs and the Map-Servers.
It is RECOMMENDED to follow guidance from the last paragraph of
Section 9 of [RFC9301] to ensure integrity protection of Map-Request
messages (e.g., to prevent xTR-ID hijacking).
7.1. Security Association between ITR and Map-Server
Since Map-Notifies from the Map-Server to the ITR need to be
authenticated, there is a need for a soft-state or hard-state
security association (e.g., a PubSubKey) between the ITRs and the
Map-Servers. For some controlled deployments, it might be possible
to have a shared PubSubKey (or set of keys) between the ITRs and the
Map-Servers. However, if pre-shared keys are not used in the
deployment, LISP Security (LISP-SEC) [RFC9303] can be used as follows
to create a security association between the ITR and the Map-Server.
First, when the ITR is sending a Map-Request with the N-bit set as
described in Section 5, the ITR also performs the steps described in
Section 6.4 of [RFC9303]. The ITR can then generate a PubSubKey by
deriving a key from the One-Time Key (OTK) and Map-Request's nonce as
follows: PubSubKey = KDF(OTK + nonce), where KDF is the Key
Derivation Function indicated by the OTK Wrapping ID. If the OTK
Wrapping ID equals NULL-KEY-WRAP-128, then the PubSubKey is the OTK.
Note that, as opposed to the pre-shared PubSubKey, this generated
PubSubKey is different per EID-Prefix to which an ITR subscribes
(since the ITR will use a different OTK per Map-Request).
When the Map-Server receives the Map-Request, it follows the
procedure specified in Section 5 with the following considerations:
the Map-Server MUST verify that the OTK has not been used before. If
the Map-Server verifies the OTK and cannot determine that the OTK has
not been used before, the subscription request fails due to
authentication, which triggers a Negative Map-Reply with ACT bits set
to 5 "Drop/Auth-Failure", as described in Section 5. The xTR might
try again with a different OTK upon receipt of this Negative Map-
Reply. Note that a Map-Server implementation may decide not to keep
track of all past OTKs and instead use some form of hash. In that
case, hash collisions are handled as if the OTK has been reused.
Such an implementation needs to balance the hash length with the rate
of collisions expected for the particular deployment; this is
implementation specific. If the Map-Server has to reply with a Map-
Reply for any other reason (e.g., if PubSub is not supported or a
subscription is not accepted), then it follows the normal LISP-SEC
procedure described in Section 5.7 of [RFC9303]. No PubSubKey,
security association, or subscription state is created when the Map-
Server responds with any Map-Reply message.
Otherwise, if the Map-Server has to reply with a Map-Notify (e.g.,
due to the subscription being accepted) to a received Map-Request,
the following extra steps take place:
* The Map-Server extracts the OTK and the OTK Wrapping ID from the
LISP-SEC Encapsulated Control Message (ECM) Authentication Data.
* The Map-Server generates a PubSubKey by deriving a key from the
OTK, as described before for the ITR. This is the same PubSubKey
derived at the ITR that is used to establish a security
association between the ITR and the Map-Server.
* The PubSubKey can now be used to sign and authenticate any Map-
Notify between the Map-Server and the ITR for the subscribed EID-
Prefix. This includes the Map-Notify sent as a confirmation to
the subscription. When the ITR wants to update the security
association for that Map-Server and EID-Prefix, it once again
follows the procedure described in this section.
Note that if the Map-Server replies with a Map-Notify, none of the
regular LISP-SEC steps regarding Map-Reply described in Section 5.7
of [RFC9303] occur.
7.2. DDoS Attack Mitigation
If PubSub is deployed under the scope of applicability defined in
Section 1.1, only known nodes can participate on the PubSub
deployment. DDoS attacks based on replayed messages by unknown nodes
are avoided by the use of nonce and the security association between
the ITRs and the Map-Servers. Misbehaving known nodes may send
massive subscription requests, which may lead to exhausting the
resources of a Map-Server. Furthermore, frequently changing the
state of a subscription may also be considered as an attack vector.
To mitigate such issues, Section 5.3 of [RFC9301] discusses rate-
limiting Map-Requests, and Section 5.7 of [RFC9301] discusses rate-
limiting Map-Notifies. Note that when the Map-Notify rate-limit
threshold is met for a particular xTR-ID, the Map-Server will discard
additional subscription requests from that xTR-ID and will fall back
to the behavior described in [RFC9301] when receiving a Map-Request
from that xTR-ID (i.e., the Map-Server will send a Map-Reply).
8. IANA Considerations
IANA has assigned the following new bit from the "LISP Control Plane
Header Bits: Map-Request" registry within the "Locator/ID Separation
Protocol (LISP) Parameters" group of registries [IANA-LISP]:
+===========+===============+==========+=============+===========+
| Spec Name | IANA Name | Bit | Description | Reference |
| | | Position | | |
+===========+===============+==========+=============+===========+
| I | Map-Request-I | 11 | xTR-ID Bit | RFC 9437 |
+-----------+---------------+----------+-------------+-----------+
Table 1: Addition to the Map-Request Header Bits Registry
IANA has also created a new registry entitled "LISP Control Plane
Header Bits: Map-Request-Record" within the "Locator/ID Separation
Protocol (LISP) Parameters" group of registries [IANA-LISP].
The initial content of this registry is shown in Table 2.
+====+===============+========+========================+===========+
|Spec| IANA Name |Bit | Description | Reference |
|Name| |Position| | |
+====+===============+========+========================+===========+
|N | Map-Request-N |1 | Notification-Requested | RFC 9437 |
| | | | Bit | |
+----+---------------+--------+------------------------+-----------+
Table 2: Initial Content of LISP Control Plane Header Bits:
Map-Request-Record Registry
The remaining bits (i.e., bit positions 2-8) are Unassigned.
The policy for allocating new bits in this registry is "Specification
Required" (Section 4.6 of [RFC8126]).
Allocation requests are evaluated on the advice of one or more
designated experts. Designated experts should consider whether the
proposed registration duplicates existing entries and whether the
registration description is sufficiently detailed and fits the
purpose of this registry. These criteria are to be considered in
addition to those provided in Section 4.6 of [RFC8126] (e.g., the
proposed registration "must be documented in a permanent and readily
available public specification"). The designated experts will either
approve or deny the registration request, and communicate their
decision to IANA. Denials should include an explanation and, if
applicable, suggestions as to how to make the request successful.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
Writing an IANA Considerations Section in RFCs", BCP 26,
RFC 8126, DOI 10.17487/RFC8126, June 2017,
<https://www.rfc-editor.org/info/rfc8126>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC9300] Farinacci, D., Fuller, V., Meyer, D., Lewis, D., and A.
Cabellos, Ed., "The Locator/ID Separation Protocol
(LISP)", RFC 9300, DOI 10.17487/RFC9300, October 2022,
<https://www.rfc-editor.org/info/rfc9300>.
[RFC9301] Farinacci, D., Maino, F., Fuller, V., and A. Cabellos,
Ed., "Locator/ID Separation Protocol (LISP) Control
Plane", RFC 9301, DOI 10.17487/RFC9301, October 2022,
<https://www.rfc-editor.org/info/rfc9301>.
[RFC9303] Maino, F., Ermagan, V., Cabellos, A., and D. Saucez,
"Locator/ID Separation Protocol Security (LISP-SEC)",
RFC 9303, DOI 10.17487/RFC9303, October 2022,
<https://www.rfc-editor.org/info/rfc9303>.
9.2. Informative References
[EID-MOBILITY]
Portoles, M., Ashtaputre, V., Maino, F., Moreno, V., and
D. Farinacci, "LISP L2/L3 EID Mobility Using a Unified
Control Plane", Work in Progress, Internet-Draft, draft-
ietf-lisp-eid-mobility-12, 4 July 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-lisp-
eid-mobility-12>.
[FLOW-EXAMPLES]
Boucadair, M., "LISP PubSub Flow Examples", Work in
Progress, Internet-Draft, draft-boucadair-lisp-pubsub-
flow-examples-03, 10 February 2023,
<https://datatracker.ietf.org/doc/html/draft-boucadair-
lisp-pubsub-flow-examples-03>.
[GB-ATN] Haindl, B., Lindner, M., Moreno, V., Portoles, M., Maino,
F., and B. Venkatachalapathy, "Ground-Based LISP for the
Aeronautical Telecommunications Network", Work in
Progress, Internet-Draft, draft-haindl-lisp-gb-atn-09, 27
March 2023, <https://datatracker.ietf.org/doc/html/draft-
haindl-lisp-gb-atn-09>.
[IANA-LISP]
IANA, "Locator/ID Separation Protocol (LISP) Parameters",
<https://www.iana.org/assignments/lisp-parameters/>.
[LISP-YANG]
Ermagan, V., Rodriguez-Natal, A., Coras, F., Moberg, C.,
Rahman, R., Cabellos, A., and F. Maino, "LISP YANG Model",
Work in Progress, Internet-Draft, draft-ietf-lisp-yang-19,
2 March 2023, <https://datatracker.ietf.org/doc/html/
draft-ietf-lisp-yang-19>.
[RFC6835] Farinacci, D. and D. Meyer, "The Locator/ID Separation
Protocol Internet Groper (LIG)", RFC 6835,
DOI 10.17487/RFC6835, January 2013,
<https://www.rfc-editor.org/info/rfc6835>.
[UBERLAY] Moreno, V., Farinacci, D., Rodriguez-Natal, A., Portoles-
Comeras, M., Maino, F., and S. Hooda, "Uberlay
Interconnection of Multiple LISP overlays", Work in
Progress, Internet-Draft, draft-moreno-lisp-uberlay-06, 28
September 2022, <https://datatracker.ietf.org/doc/html/
draft-moreno-lisp-uberlay-06>.
Appendix A. Sample PubSub Deployment Experiences
Some LISP production networks have been running different forms of
PubSub for some time. The following subsections provide an inventory
of some experience lessons from these deployments.
A.1. PubSub as a Monitoring Tool
Some LISP deployments are using PubSub as a way to monitor EID-
Prefixes (particularly, EID-to-RLOC mappings). To that aim, some
LISP implementations have extended the LISP Internet Groper ('lig')
[RFC6835] tool to use PubSub. Such an extension is meant to support
an interactive mode with 'lig' and to request subscription for the
EID of interest. If there are RLOC changes, the Map-Server sends a
notification, and then the 'lig' client displays that change to the
user.
A.2. Mitigating Negative Map-Cache Entries
Section 8.1 of [RFC9301] suggests two TTL values for Negative Map-
Replies: either a 15-minute TTL (if the EID-Prefix does not exist) or
a 1-minute TTL (if the prefix exists but has not been registered).
While these values are based on the original operational experience
of the LISP protocol designers, negative cache entries have two
unintended effects that were observed in production.
First, if the xTR keeps receiving traffic for a negative EID
destination (i.e., an EID-Prefix with no RLOCs associated with it),
it will try to resolve the destination again once the cached state
expires, even if the state has not changed in the Map-Server. It was
observed in production that this is happening often in networks that
have a significant amount of traffic addressed for outside of the
LISP network. This might result in excessive resolution signaling to
keep retrieving the same state due to the cache expiring. PubSub is
used to relax TTL values and cache negative mapping entries for
longer periods of time, avoiding unnecessary refreshes of these
forwarding entries and drastically reducing signaling in these
scenarios. In general, a TTL-based schema is a "polling mechanism"
that leads to more signaling where PubSub provides an "event-
triggered mechanism" at the cost of state.
Second, if the state does indeed change in the Map-Server, updates
based on TTL timeouts might prevent the cached state at the xTR from
being updated until the TTL expires. This behavior was observed
during configuration (or reconfiguration) periods on the network,
where EID-Prefixes that are no longer negative do not receive the
traffic yet, due to stale Map-Cache entries present in the network.
With the activation of PubSub, stale caches can be updated as soon as
the state changes.
A.3. Improved Mobility Latency
An improved convergence time was observed on the presence of mobility
events on LISP networks running PubSub as compared with running LISP
[RFC9301]. As described in Section 4.1.2.1 of [EID-MOBILITY], LISP
can rely on data-driven Solicit-Map-Requests (SMRs) to ensure
eventual network convergence. Generally, PubSub offers faster
convergence due to (1) no need to wait for a data-triggered event and
(2) less signaling as compared with the SMR-based flow. Note that
when a Map-Server running PubSub has to update a large number of
subscribers at once (i.e., when a popular mapping is updated), SMR-
based convergence may be faster for a small subset of the subscribers
(those receiving PubSub updates last). Deployment experience reveals
that data-driven SMRs and PubSub mechanisms complement each other and
provide a fast and resilient network infrastructure in the presence
of mobility events.
Furthermore, experience showed that not all LISP entities on the
network need to implement PubSub for the network to get the benefits.
In scenarios with significant traffic coming from outside of the LISP
network, the experience showed that enabling PubSub in the border
routers significantly improves mobility latency overall. Even if
edge xTRs do not implement PubSub, and traffic is exchanged between
EID-Prefixes at the edge, xTRs still converge based on data-driven
events and SMR-triggered updates.
A.4. Enhanced Reachability with Dynamic Redistribution of Prefixes
There is a need to interconnect LISP networks with other networks
that might or might not run LISP. Some of those scenarios are
similar to the ones described in [GB-ATN] and [UBERLAY]. When
connecting LISP to other networks, the experience revealed that in
many deployments the point of interaction with the other domains is
not the Mapping System but rather the border router of the LISP site.
For those cases, the border router needs to be aware of the LISP
prefixes to redistribute them to the other networks. Over the years,
different solutions have been used.
First, Map-Servers were collocated with the border routers, but this
was hard to scale since border routers scale at a different pace than
Map-Servers. Second, decoupled Map-Servers and border routers were
used with static configuration of LISP entries on the border, which
was problematic when modifications were made. Third, a routing
protocol (e.g., BGP) can be used to redistribute LISP prefixes from
the Map-Servers to a border router, but this comes with some
implications; in particular, the Map-Servers need to implement an
additional protocol, which consumes resources and needs to be
properly configured. Therefore, once PubSub was available,
deployments started to adapt it to enable border routers to
dynamically learn the prefixes they need to redistribute without a
need for extra protocols or extra configuration on the network.
In other words, PubSub can be used to discover EID-Prefixes so they
can be imported into other routing domains that do not use LISP.
Similarly, PubSub can also be used to discover when EID-Prefixes need
to be withdrawn from other routing domains. That is, in a typical
deployment, a border router will withdraw an EID-Prefix that it has
been announcing to external routing domains if it receives a
notification that the RLOC-set for that EID-Prefix is now empty.
A.5. Better Serviceability
EID-to-RLOC mappings can have a very long TTL, sometimes on the order
of several hours. Upon the expiry of that TTL, the xTR checks if
these entries are being used and removes any entry that is not being
used. The problem with a very long Map-Cache TTL is that (in the
absence of PubSub) if a mapping changes but is not being used, the
cache remains but is stale. This is due to no data traffic being
sent to the old location to trigger an SMR-based Map-Cache update as
described in Section 4.1.2.1 of [EID-MOBILITY]. If the network
operator runs a show command on a router to track the state of the
Map-Cache, the router will display multiple entries waiting to expire
but with stale RLOC information. This might be confusing for
operators sometimes, particularly when they are debugging problems.
With PubSub, the Map-Cache is updated with the correct RLOC
information, even when it is not being used or waiting to expire,
which helps with debugging.
Acknowledgments
We would like to thank Marc Portoles, Balaji Venkatachalapathy,
Bernhard Haindl, Luigi Iannone, and Padma Pillay-Esnault for their
great suggestions and help regarding this document.
Many thanks to Alvaro Retana for the careful AD review.
Thanks to Chris M. Lonvick for the security directorate review, Al
Morton for the OPS-DIR review, Roni Even for the Gen-ART review, Mike
McBride for the rtg-dir review, Magnus Westerlund for the tsv
directorate review, and Sheng Jiang for the int-dir review.
Thanks to John Scudder, Erik Kline, Lars Eggert, Warren Kumari,
Martin Duke, Murray Kucherawy, Éric Vyncke, Robert Wilton,
Zaheduzzaman Sarker, and Roman Danyliw for the IESG review.
This work was partly funded by the ANR LISP-Lab project #ANR-
13-INFR-009 <https://anr.fr/Projet-ANR-13-INFR-0009>.
Contributors
Dino Farinacci
lispers.net
San Jose, CA
United States of America
Email: farinacci@gmail.com
Johnson Leong
Email: johnsonleong@gmail.com
Fabio Maino
Cisco
San Jose, CA
United States of America
Email: fmaino@cisco.com
Christian Jacquenet
Orange
Rennes
France
Email: christian.jacquenet@orange.com
Stefano Secci
Cnam
France
Email: stefano.secci@cnam.fr
Authors' Addresses
Alberto Rodriguez-Natal
Cisco
Barcelona
Spain
Email: natal@cisco.com
Vina Ermagan
Google
United States of America
Email: ermagan@gmail.com
Albert Cabellos
UPC/BarcelonaTech
Barcelona
Spain
Email: acabello@ac.upc.edu
Sharon Barkai
Nexar
Email: sharon.barkai@getnexar.com
Mohamed Boucadair
Orange
Rennes
France
Email: mohamed.boucadair@orange.com
|