Movatterモバイル変換


[0]ホーム

URL:


RFC 9837VPN Service Destination OptionAugust 2025
Bonica, et al.Experimental[Page]
Stream:
Internet Engineering Task Force (IETF)
RFC:
9837
Category:
Experimental
Published:
ISSN:
2070-1721
Authors:
R. Bonica
Juniper Networks
X. Li
CERNET Center/Tsinghua University
A. Farrel
Old Dog Consulting
Y. Kamite
NTT DOCOMO BUSINESS
L. Jalil
Verizon

RFC 9837

The IPv6 VPN Service Destination Option

Abstract

This document describes an experiment in which VPN service information is encoded in an experimental IPv6 Destination Option. The experimental IPv6 Destination Option is called the VPN Service Option.

One purpose of this experiment is to demonstrate that the VPN Service Option can be deployed in a production network. Another purpose is to demonstrate that the security measures described in this document are sufficient to protect a VPN. Finally, this document encourages replication of the experiment.

Status of This Memo

This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation.

This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are candidates for any level of Internet Standard; see Section 2 of RFC 7841.

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained athttps://www.rfc-editor.org/info/rfc9837.

Copyright Notice

Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.

Table of Contents

1.Introduction

Generic Packet Tunneling[RFC2473] allows a router in one network to encapsulate a packet in an IP header and send it to a router in another network. The receiving router removes the outer IP header and forwards the original packet into its own network. This facilitates connectivity between networks that share a private addressing[RFC1918][RFC4193] plan but are not connected by a direct link.

The IETF refined this concept in the Framework for VPN[RFC2764]. The IETF also standardized the following VPN technologies:

IPsec VPNs cryptographically protect all traffic from customer endpoint to customer endpoint. All of the other VPN technologies mentioned above share the following characteristics:

This document describes an experiment in which VPN service information is encoded in an experimental IPv6 Destination Option[RFC8200]. The experimental IPv6 Destination Option is called the VPN Service Option.

The solution described in this document offers the following benefits:

One purpose of this experiment is to demonstrate that the VPN Service Option can be deployed in a production network. Another purpose is to demonstrate that the security measures described inSection 7 of this document are sufficient to protect a VPN. Finally, this document encourages replication of the experiment, so that operational issues can be discovered.

2.Conventions and Definitions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14[RFC2119][RFC8174] when, and only when, they appear in all capitals, as shown here.

3.The VPN Service Option

The VPN Service Option is an IPv6 Destination Option encoded according to rules defined in[RFC8200].

As described inSection 4.2 of [RFC8200], an IPv6 Destination Option contains three fields: Option Type, Opt Data Len, and Option Data. In the VPN Service Option, these fields are used as follows:

A single VPN Service OptionMAY appear in a Destination Options headerthat immediately precedes an upper-layer header. ItMUST NOT appear in any otherextension header. If a receiver finds the VPN Service Option in any otherextension header, itMUST NOT recognize the option. The packetMUST be processed according to the setting of the two highest-order bits of the Option Type (see NOTE below).

NOTE: For this experiment, the Option Type is set to '01011110', i.e.,0x5E. The highest-order two bits are set to 01, indicating that therequired action by a destination node that does not recognize the optionis to discard the packet. The third highest-order bit is set to 0,indicating that Option Data cannot be modified along the path betweenthe packet's source and its destination. The remaining low-order bitsare set to '11110' to indicate the single IPv6 Destination Option Typecode point available in the "Destination Options and Hop-by-Hop Options" registry[V6MSG] for experimentation.

4.Forwarding Plane Considerations

The ingress PE encapsulates the customer data in a tunnel header. The tunnel headerMUST contain an IPv6 header and a Destination Options header that immediately precedes the customer data. ItMAY also include any legal combination of IPv6 extension headers.

The IPv6 Header contains the following (all defined in[RFC8200]):

The IPv6 Destination Options Extension Header contains the following (all defined in[RFC8200]):

5.Control Plane Considerations

The FIB can be populated by:

Routing protocol extensions that support the VPN Service Option are beyond the scope of this document.

6.IANA Considerations

This document has no IANA actions.

7.Security Considerations

A VPN is characterized by the following security policy:

A set of PE routers cooperate to enforce this security policy. If a device outside of that set could impersonate a device inside of the set, it would be possible for that device to subvert security policy. Therefore, impersonation must not be possible. The following paragraphs describe procedures that prevent impersonation.

The VPN Service Option can be deployed:

When the VPN Service Option is deployed on the global Internet, the tunnel that connects the ingress PE to the egress PEMUST be cryptographically protected by one of the following:

When the VPN Service Option is deployed in a limited domain, all nodes at the edge of limited domainMUST maintain Access Control Lists (ACLs). These ACLsMUST discard packets that satisfy the following criteria:

The mitigation techniques mentioned above operate in fail-open mode. That is, they requireexplicit configuration in order to ensure that packetsusing the approach described in this document do not leak out of a domain.See[SAFE-LIM-DOMAINS] for a discussion of fail-open and fail-closed modes.

For further information on the security concerns related to IP tunnels and the recommended mitigation techniques, please see[RFC6169].

8.Deployment Considerations

The VPN Service Option is imposed by an ingress PE and processed by anegress PE. It is not processed by any other nodes along the delivery pathbetween the ingress PE and egress PE.

However, some networks discard packets that include IPv6 Destination Options. This is an impediment to deployment.

Because the VPN Service Option uses an experimental code point, thereis a risk of collisions with other experiments. Specifically, theegress PE may process packets from another experiment that uses thesame code point.

As with all experiments with IETF protocols, it is expected thatcare is taken by the operator to ensure that all nodes participatingin an experiment are carefully configured.

Because the VPN Service Destination Option uses an experimental code point,processing of this optionMUST be disabled by default. Explicit configurationis required to enable processing of the option.

9.Experimental Results

Parties participating in this experiment should publish experimental results within one year of the publication of this document. Experimental results should address the following:

10.References

10.1.Normative References

[RFC2119]
Bradner, S.,"Key words for use in RFCs to Indicate Requirement Levels",BCP 14,RFC 2119,DOI 10.17487/RFC2119,,<https://www.rfc-editor.org/info/rfc2119>.
[RFC6169]
Krishnan, S.,Thaler, D., andJ. Hoagland,"Security Concerns with IP Tunneling",RFC 6169,DOI 10.17487/RFC6169,,<https://www.rfc-editor.org/info/rfc6169>.
[RFC6724]
Thaler, D., Ed.,Draves, R.,Matsumoto, A., andT. Chown,"Default Address Selection for Internet Protocol Version 6 (IPv6)",RFC 6724,DOI 10.17487/RFC6724,,<https://www.rfc-editor.org/info/rfc6724>.
[RFC8174]
Leiba, B.,"Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words",BCP 14,RFC 8174,DOI 10.17487/RFC8174,,<https://www.rfc-editor.org/info/rfc8174>.
[RFC8200]
Deering, S. andR. Hinden,"Internet Protocol, Version 6 (IPv6) Specification",STD 86,RFC 8200,DOI 10.17487/RFC8200,,<https://www.rfc-editor.org/info/rfc8200>.

10.2.Informative References

[RFC1918]
Rekhter, Y.,Moskowitz, B.,Karrenberg, D.,de Groot, G. J., andE. Lear,"Address Allocation for Private Internets",BCP 5,RFC 1918,DOI 10.17487/RFC1918,,<https://www.rfc-editor.org/info/rfc1918>.
[RFC2473]
Conta, A. andS. Deering,"Generic Packet Tunneling in IPv6 Specification",RFC 2473,DOI 10.17487/RFC2473,,<https://www.rfc-editor.org/info/rfc2473>.
[RFC2764]
Gleeson, B.,Lin, A.,Heinanen, J.,Armitage, G., andA. Malis,"A Framework for IP Based Virtual Private Networks",RFC 2764,DOI 10.17487/RFC2764,,<https://www.rfc-editor.org/info/rfc2764>.
[RFC3884]
Touch, J.,Eggert, L., andY. Wang,"Use of IPsec Transport Mode for Dynamic Routing",RFC 3884,DOI 10.17487/RFC3884,,<https://www.rfc-editor.org/info/rfc3884>.
[RFC4193]
Hinden, R. andB. Haberman,"Unique Local IPv6 Unicast Addresses",RFC 4193,DOI 10.17487/RFC4193,,<https://www.rfc-editor.org/info/rfc4193>.
[RFC4302]
Kent, S.,"IP Authentication Header",RFC 4302,DOI 10.17487/RFC4302,,<https://www.rfc-editor.org/info/rfc4302>.
[RFC4303]
Kent, S.,"IP Encapsulating Security Payload (ESP)",RFC 4303,DOI 10.17487/RFC4303,,<https://www.rfc-editor.org/info/rfc4303>.
[RFC4364]
Rosen, E. andY. Rekhter,"BGP/MPLS IP Virtual Private Networks (VPNs)",RFC 4364,DOI 10.17487/RFC4364,,<https://www.rfc-editor.org/info/rfc4364>.
[RFC4761]
Kompella, K., Ed. andY. Rekhter, Ed.,"Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling",RFC 4761,DOI 10.17487/RFC4761,,<https://www.rfc-editor.org/info/rfc4761>.
[RFC4762]
Lasserre, M., Ed. andV. Kompella, Ed.,"Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling",RFC 4762,DOI 10.17487/RFC4762,,<https://www.rfc-editor.org/info/rfc4762>.
[RFC5440]
Vasseur, JP., Ed. andJL. Le Roux, Ed.,"Path Computation Element (PCE) Communication Protocol (PCEP)",RFC 5440,DOI 10.17487/RFC5440,,<https://www.rfc-editor.org/info/rfc5440>.
[RFC6241]
Enns, R., Ed.,Bjorklund, M., Ed.,Schoenwaelder, J., Ed., andA. Bierman, Ed.,"Network Configuration Protocol (NETCONF)",RFC 6241,DOI 10.17487/RFC6241,,<https://www.rfc-editor.org/info/rfc6241>.
[RFC6624]
Kompella, K.,Kothari, B., andR. Cherukuri,"Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling",RFC 6624,DOI 10.17487/RFC6624,,<https://www.rfc-editor.org/info/rfc6624>.
[RFC7432]
Sajassi, A., Ed.,Aggarwal, R.,Bitar, N.,Isaac, A.,Uttaro, J.,Drake, J., andW. Henderickx,"BGP MPLS-Based Ethernet VPN",RFC 7432,DOI 10.17487/RFC7432,,<https://www.rfc-editor.org/info/rfc7432>.
[RFC8077]
Martini, L., Ed. andG. Heron, Ed.,"Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)",STD 84,RFC 8077,DOI 10.17487/RFC8077,,<https://www.rfc-editor.org/info/rfc8077>.
[RFC8986]
Filsfils, C., Ed.,Camarillo, P., Ed.,Leddy, J.,Voyer, D.,Matsushima, S., andZ. Li,"Segment Routing over IPv6 (SRv6) Network Programming",RFC 8986,DOI 10.17487/RFC8986,,<https://www.rfc-editor.org/info/rfc8986>.
[RFC9469]
Rabadan, J., Ed.,Bocci, M.,Boutros, S., andA. Sajassi,"Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks",RFC 9469,DOI 10.17487/RFC9469,,<https://www.rfc-editor.org/info/rfc9469>.
[SAFE-LIM-DOMAINS]
Kumari, W.,Alston, A.,Vyncke, É.,Krishnan, S., andD. Eastlake,"Safe(r) Limited Domains",Work in Progress,Internet-Draft, draft-wkumari-intarea-safe-limited-domains-04,,<https://datatracker.ietf.org/doc/html/draft-wkumari-intarea-safe-limited-domains-04>.
[V6MSG]
IANA,"Destination Options and Hop-by-Hop Options",<https://www.iana.org/assignments/ipv6-parameters>.

Acknowledgements

Thanks toGorry Fairhurst,Antoine Fressancourt,Eliot Lear, andMark Smith for their reviews and contributions to this document.

Authors' Addresses

Ron Bonica
Juniper Networks
Herndon,Virginia
United States of America
Email:rbonica@juniper.net
Xing Li
CERNET Center/Tsinghua University
Beijing
China
Email:xing@cernet.edu.cn
Adrian Farrel
Old Dog Consulting
United Kingdom
Email:adrian@olddog.co.uk
Yuji Kamite
NTT DOCOMO BUSINESS
Chiyoda-ku, Tokyo
Japan
Email:y.kamite@ntt.com
Luay Jalil
Verizon
Richardson,Texas
United States of America
Email:luay.jalil@one.verizon.com

[8]ページ先頭

©2009-2026 Movatter.jp