datatracker.ietf.org
Sign in
Version 5.6.2.p5, 2014-08-04
Report a bug

A General Framework of Source Address Validation and Traceback for IPv4/IPv6 Transition Scenarios
draft-xu-savi-transition-05

Document type: Active Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2014-05-04
Intended RFC status: Unknown
Other versions: plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

SAVI                                            K.Xu, G.Hu, J.Bi, M.Xu
Internet Draft                                          Tsinghua Univ.
Intended status: Standard Tracks                                F.Shi
Expires: November 2014                                   China Telecom
                                                           May 4, 2014

     A General Framework of Source Address Validation and Traceback for
                      IPv4/IPv6 Transition Scenarios
                      draft-xu-savi-transition-05.txt

Abstract

   SAVI (Source Address Validation Improvement) is an excellent
   mechanism for anti-IP-spoofing, which was advocated by IETF but only
   focused on single-stack or simple network scenarios right now. To the
   best of our knowledge, existing studies have not paid attention to
   the IPv4/IPv6 transition scenarios. However, since IPv4/IPv6
   transition schemes are plenty and various, one solution cannot meet
   all requirements of them. In this draft, we present a SAVI-based
   general framework for IP source address validation and traceback in
   the IPv4/IPv6 transition scenarios, which achieve this by extracting
   out essential and mutual properties from these schemes, and forming
   sub-solutions for each property. When one transition scheme is
   composed from various properties, its IP source address validation
   and traceback solution is directly comprised by the corresponding
   sub-solutions. Thus, the most exciting advantage of this framework is
   that it is a once-and-for-all solution no matter how transition
   schemes change.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts. The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 4, 2014.

Xu, et al.             Expires November 5 2014                [Page 1]
Internet-Draft             SAVI Transition                    May 2014

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document. Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.

    (This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 10
   2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Table of Contents

   1.   Introduction ............................................. 3
   2.   Conventions used in this document ......................... 4
   3.   Framework description ..................................... 4
      3.1. Property Extraction .................................... 5
      3.2. Solutions of IP source address validation .............. 6
      3.3. Solutions to IP source address traceback .............. 10
   4.   Framework verification................................... 13
      4.1. Public 4over6 ........................................ 13
      4.2. 6RD .................................................. 14
      4.3. DS-Lite .............................................. 14
      4.4. 4RD .................................................. 15
      4.5. A+P .................................................. 15
      4.6. IVI .................................................. 15
   5.   Framework implementation................................. 15

[include full document text]