A general SAVI-based source address validation and traceback framework for 4over6 transition scenarios
draft-xu-savi-transition-01

The information below is for an old version of the document
Document Type Active Internet-Draft (individual)
Last updated 2012-05-08
Stream (None)
Intended RFC status (None)
Formats plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
SAVI                                            K.Xu, G.Hu, J.Bi, M.Xu
Internet Draft                                          Tsinghua Univ.
Intended status: Standard Tracks                                F.Shi
Expires: November 2012                                   China Telecom
                                                          May 8, 2012

        A general SAVI-based source address validation and traceback
                 framework for 4over6 transition scenarios
                      draft-xu-savi-transition-01.txt

Abstract

   Many proposals have been presented for preventing IP spoofing from
   occurring in network. An outstanding of them is the SAVI (Source
   Address Validation Improvement) proposal which was advocated by IETF
   SAVI workgroup for solving this problem from user access switch. SAVI
   Working Group is developing standardize mechanisms that prevent nodes
   attached to the same IP link from spoofing each other's IP addresses,
   and achieve IP source address validation at a finer granularity.
   However, up to now, to the best of our knowledge, none of them has
   focused on the scenarios of 4over6 transition, that is, IPv4 packets
   transit IPv6 network and arrive at other edge IPv4 network(s). With
   the boom of IPv6 networks, this issue becomes more and more urgent.
   In addition, since 4over6 plans are plenty and various, one solution
   cannot meet all requirements of these plans. This document describes
   a framework of IP source address validation and traceback for 4over6
   transition scenarios, which extract out the essential and mutual
   properties from these plans and form corresponding sub-solution for
   each property. When one 4over6 plan is combined by some of them, the
   solution of IP source address validation and traceback for this plan
   are directly comprised of the combination of corresponding sub-
   solution. Thus, the most exciting advantage of this framework is that
   it is a once for all solution no matter how 4over6 plans changes.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts. The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any

Xu, et al.            Expires November 8, 2012                [Page 1]
Internet-Draft             SAVI Transition                    May 2012

   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 8, 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents carefully,
   as they describe your rights and restrictions with respect to this
   document. Code Components extracted from this document must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions and are provided without warranty as described in
   the Simplified BSD License.

    (This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 10
   2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow

   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Table of Contents

   1.Introduction ................................................. 3
   2.Conventions used in this document............................. 5
   3.Framework description......................................... 5
      3.1.Goals and considerations of this framework............... 5
      3.2.Property extraction...................................... 5
      3.3.Measurements for IP source address validation............ 7
      3.4.Measurements for IP source address traceback............. 9
   4.Framework verification....................................... 12
      4.1.Public 4over6 .......................................... 12
Show full document text