IEN-156 Danny Cohen
U S C / I S I
September 7, 1980
CONTROLLED ROUTING IN THE CATENET ENVIRONMENT
This note suggests the use of Strict Source Routing,
SSR, for gaining more control over the routes which
are used for messages to traverse the catenet.
One of the cornerstones of the IN-philosophy is that users are
completely separated from the low level transport issues such as
routing.
While this is generally so, there are some real world situations where
it is desired that users be given a way to influence the routing.
The ARPA Internet Protocol, IP, (see IEN-128), allows users to affect
the routing decisions by using the source routing (SR) mechanism.
There are several reasons for users to influence the routing, rather
than trusting the catenet to figure out the best route.
Some of these reasons are:
[A] Help the catenet find a destination otherwise unknown.
[B] Promoting the use of certain nets for reasons such as favorite
tariff.
[C] Avoiding certain networks for reasons such as various
sensativities.
The current source routing option of IP, as described in IEN-128
addresses mainly the first reason, [A], only.
In order to provide help to the catenet in figuring a route it allows
the user to provide a sequence of addresses such that each of them is
locally unique (hence unambiguous and known) where it is supposed to be
interpreted. Obviously, this sequence must be continuous in the sense
that at each address the next address in the sequence, must be known.
The choice of route from each address to the next is left to the catenet
to determine.
2 IP "assume"s that the given source route is a sequence of IP-addresses, each in the 32-bit format of 8/24 for the "NET-ID" followed by the "REST" which is typically a host address, including gateways. However, this does not necessarily have to be so. If the NET-ID filed may include ESCAPE-CODES, as advocated in IEN-122, a much more powerful scheme may evolve. The above scheme may be used in some clever way also for [B], the promotion of the use of certain nets. However, it does not provide an acceptable solution for [C], the avoidance of certain networks. We argue that [C] is not a well formed requirement, and a tighter definition is required. The reason for introducing the requirement to avoid certain networks is based on the classification of nets into friends and foes. If one knows about all networks, one could classify them all. But if some are unknown, they lack classification. In a controlled environment, where foes should be avoided, the unclassified nets must be avoided, too. Hence, it is not enough to insist on avoiding the set of all known foe nets. One must insist, instead, on using only nets which are positively classified as friends. Therefore, [C] should be changed from "avoiding known foes" into "using only well established friends". Since the source routing technique which was described above does not tell the catenet how to route messages between the given addresses, it is possible for messages to be routed through foes while traversing a sequence of friendly addresses. Hence, the above source routing technique is not adequate at all for [C], avoiding all foes. In order to address this problem to following solution is proposed: Define a new variant of source routing, similar to the one described above, with the additional requirements that messages cross network boundaries only at the gateways specified in the source route. If there is no DIRECT connection, meaning through a single network between two successive addresses in the source route, the message should be discarded rather and no attempt is made to reach the next address via another intermediate network (and gateways). If this new option of Strict Source Routing, SSR, is adopted then it is up to the users to construct "safe" SSRs which include only networks and gateways which are positively identified as trustworthy friends and are known to have only gateways which are sure to handle the SSR properly. The source routing which is not SSR may be referred to as an LSR (Loose SR).
3 One may view the LSR as "piecewise end-to-end" routing at the IP (gateways) level, as opposed to the SSR which is a kind of hop-by-hop routing at the same level. The notion of a gateway being specified in a SSR has to be clarified. Gateway per se do not have IP addresses, but their interfaces to local networks do. Under SSR when the address Ni/Hj (Network/Host) is specified for a gateway, it is required to reach it through the network Ni even in the cases that other routes are available. Consider the following example: +---------------------------------------------------+ | A11 Network-Alpha A22 | +---------------------------------------------------+ | | ************* ************* * gateway-A * * gateway-B * ************* ************* | | +---------------------------------------------------------------------+ | H-1 B11 Network-Beta B22 H-2 | +---------------------------------------------------------------------+ | | ******* ******* * H-1 * * H-2 * ******* ******* If the SSR specifies the address (Alpha/A11) followed by the address (Beta/B22) then the only accepatble route is to cross Gateway-A and then to traverse the Network-Beta to B22. It is not acceptable for the Gateway-A to recognize that (Beta/B22) is actually a gateway which is also on Network-Alpha and therefore to route through this network to (Alpha/A22) expecting the message to cross Gateway-B there. Hence, H-1 can force his message to get to H-2 through the Network-Alpha by using the following SSR: (Beta/B11)-(Alpha/A22)-(Beta/H-2). If the Network-Alpha breaks between A11 and A22 this SSR will result in a communication failure, even though good routes through Network-Beta only are avilable, and might have been automatically used if LSR was used.
4 ON INTRANET SSR It is possible to carry the foes and friends classification further from the nets (internet) level down into the hosts (intranet) level. One way to achieve that effect is by "teaching" the half-gateways which are in each host about SSRs. However, in this case the definition of DIRECT connection has to be explicitly defined for each network. In the case of the ARPANET hosts cannot have this notions which is at the IMPs level. In the case of broadcast nets (such as satellite based, packets radios, Ethernet-like or ring-like nets) no connection is "direct enough" even though it has no intermediate agents along the way. It seems that SSRs are much more difficult to implement at the intranet (host) level, and we may be on better and safer ground by implementing SSRs at first only at the internet (nets and gateways) level. This obviously means that a net can be certified as a friendly net if, and only if, all of its hosts and intermediate agents are individually certified as such. For example, an Ethernet-like network is trustworthy only if all of its hosts (gateways included) are. However, a network such as the ARPANet can be trustworthy if all af its intermediate agents (the IMPs) are, even though some of its hosts are not. The difficulty of implementing intranet SSR should be of no surprise since the IN-philosophy is to hide the intranet technicalities from the internet users. CONCLUSION A Strict Source Routing could be used by a set of "certified friendly" networks in order to avoid the transmission of certain datagrams through all the networks which are parts of the catenet but are not as trustworthy as others.
mirror server hosted at Truenetwork, Russian Federation.