Internet Engineering Task Force (IETF) Request for Comments: March 2012

Similar documents
Internet Engineering Task Force (IETF) Nokia P. Pillay-Esnault Huawei USA January 2019

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track May 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Informational. R. White. D. McPherson Verisign, Inc.

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2011

Request for Comments: A. Davey Data Connection Limited A. Lindem, Ed. Redback Networks September 2008

Internet Engineering Task Force (IETF) A. Retana Cisco Systems July 2013

Category: Standards Track Redback Networks June 2008

Internet Engineering Task Force (IETF) Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: Category: Experimental February 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: November 2015

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: V. Reddy Vallem. F.

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Cisco May 2012

Internet Engineering Task Force (IETF) Updates: 5614 October 2013 Category: Experimental ISSN:

Internet Engineering Task Force (IETF) Category: Informational. May IEEE Information Element for the IETF

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: February 2016

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: S. Previdi. Cisco Systems

Network Working Group Request for Comments: A. Zinin Alcatel-Lucent March OSPF Out-of-Band Link State Database (LSDB) Resynchronization

Internet Engineering Task Force (IETF) Updates: 5451 March 2012 Category: Standards Track ISSN:

Network Working Group. Category: Experimental April 2009

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: April 2011

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7189 Category: Standards Track March 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6034 Category: Standards Track October 2010 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track. S. Hegde Juniper Networks, Inc. S. Litkowski B. Decraene Orange July 2016

Internet Engineering Task Force (IETF) Cisco Systems, Inc. April 2015

Internet Engineering Task Force (IETF) Category: Standards Track. Enterprise Architects February 2012

Internet Engineering Task Force (IETF) Request for Comments: 7330 Category: Standards Track. Cisco Systems August 2014

Internet Engineering Task Force (IETF) May 2011

Internet Engineering Task Force (IETF) BCP: 183 May 2013 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Category: Informational. K. Michielsen Cisco Systems November 2011

Internet Engineering Task Force (IETF) Request for Comments: 7881 Category: Standards Track. Big Switch Networks July 2016

Internet Engineering Task Force (IETF) Request for Comments: 8142 Category: Standards Track April 2017 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6379 Obsoletes: 4869 Category: Informational October 2011 ISSN:

Network Working Group Request for Comments: A. Zinin Alcatel-Lucent March 2007

Internet Engineering Task Force (IETF) Request for Comments: ISSN: August 2010

Internet Engineering Task Force (IETF) Category: Standards Track. S. Aldrin Google, Inc. L. Ginsberg Cisco Systems November 2018

Internet Engineering Task Force (IETF) Category: Standards Track. J. Quittek. NEC Europe Ltd. October 2012

Internet Engineering Task Force (IETF) Updates: 2474 August 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8035 Updates: 5761 November 2016 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) June Network Time Protocol (NTP) Server Option for DHCPv6

Internet Engineering Task Force (IETF) Updates: 5885 Category: Standards Track July 2016 ISSN:

Internet Engineering Task Force (IETF) Category: Informational March 2016 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7125 Category: Informational. February 2014

Open Shortest Path First IGP. Intended status: Standards Track. Individual M. Nanduri ebay Corporation L. Jalil Verizon November 26, 2017

Internet Engineering Task Force (IETF) Request for Comments: 6028 Category: Experimental ISSN: October 2010

Internet Engineering Task Force (IETF) Request for Comments: 6441 BCP: 171 November 2011 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track. M. Petit-Huguenin Impedance Mismatch November 2013

Internet Engineering Task Force (IETF) Updates: 5066 February 2014 Category: Standards Track ISSN:

February Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.

Internet Engineering Task Force (IETF) Request for Comments: 6522 STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Updates: 4326 June 2014 Category: Standards Track ISSN:

Updates: 6126 May 2015 Category: Experimental ISSN: Extension Mechanism for the Babel Routing Protocol

Internet Engineering Task Force (IETF) Request for Comments: 7319 BCP: 191 July 2014 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Google K. Patel Cisco Systems August 2015

Internet Engineering Task Force (IETF) Category: Standards Track. Cisco Systems, Inc. J. Scudder Juniper Networks September 2016

Internet Engineering Task Force (IETF) Request for Comments: Cisco Systems, Inc. Y. Yang Sockrate Z. Liu China Mobile February 2017

Internet Engineering Task Force (IETF) Deutsche Telekom January 2015

Internet Engineering Task Force (IETF) Category: Standards Track December 2012 ISSN:

Internet Engineering Task Force (IETF) Cisco C. Perkins Futurewei Inc. October Separation of Control and User Plane for Proxy Mobile IPv6

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2016

Internet Engineering Task Force (IETF) Request for Comments: 7973 Category: Informational ISSN: November 2016

Internet Engineering Task Force (IETF) P. Jones Cisco Systems November Traversal Using Relays around NAT (TURN) Uniform Resource Identifiers

Internet Engineering Task Force (IETF) Category: Standards Track. R. Asati Cisco January 2013

DHCPv6 Option for IPv4-Embedded Multicast and Unicast IPv6 Prefixes

Internet Engineering Task Force (IETF) Request for Comments: 6440 Category: Standards Track. Huawei December 2011

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: October 2015

Internet Engineering Task Force (IETF) Request for Comments: J. Haas Juniper Networks March 2019

Category: Standards Track Cisco Systems D. Tappan Consultant October 2009

Internet Engineering Task Force (IETF) Request for Comments: 5736 Category: Informational. ICANN January 2010

Internet Engineering Task Force (IETF) Request for Comments: ISSN: January 2010

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2018

Internet Engineering Task Force (IETF) Request for Comments: 6769 Category: Informational. A. Lo Arista L. Zhang UCLA X. Xu Huawei October 2012

Internet Engineering Task Force (IETF) Request for Comments: 5725 Category: Standards Track ISSN: February 2010

Internet Engineering Task Force (IETF) Category: Standards Track. S. Krishnan Ericsson October 2015

Internet Engineering Task Force (IETF) Request for Comments: 7725 Category: Standards Track February 2016 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8186 Category: Standards Track. June 2017

Internet Engineering Task Force (IETF) S. Jiang Huawei Technologies Co., Ltd June The Secure Neighbor Discovery (SEND) Hash Threat Analysis

Internet Engineering Task Force (IETF) Request for Comments: 6594 Category: Standards Track April 2012 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track April 2013 ISSN: Formally Deprecating Some ICMPv4 Message Types

Category: Standards Track BT K. Kumaki KDDI R&D Labs A. Bonda Telecom Italia October 2008

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. January 2010

Internet Engineering Task Force (IETF) Request for Comments: ISSN: July 2014

Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015

Internet Engineering Task Force (IETF) Category: Standards Track. H. Gredler RtBrick Inc. M. Nanduri ebay Corporation L. Jalil Verizon May 2018

Internet Engineering Task Force (IETF) Category: Standards Track. March 2017

Expires: January 4, 2018 July 3, 2017

Internet Engineering Task Force (IETF) Category: Standards Track. J. Halpern Ericsson E. Levy-Abegnoli, Ed. Cisco February 2017

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track. February 2012

Internet Engineering Task Force (IETF) Request for Comments: July 2012

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: Huawei J. Tantsura Apstra, Inc. C. Filsfils. Cisco Systems, Inc.

Internet Engineering Task Force (IETF) Category: Standards Track. June 2016

Internet Engineering Task Force (IETF) Request for Comments: August 2011

Internet Engineering Task Force (IETF) Request for Comments: ISSN: November 2013

Moving the Undeployed TCP Extensions RFC 1072, RFC 1106, RFC 1110, RFC 1145, RFC 1146, RFC 1379, RFC 1644, and RFC 1693 to Historic Status.

Internet Engineering Task Force (IETF) Category: Best Current Practice. Cisco Systems July IPv6 Prefix Length Recommendation for Forwarding

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5959 Category: Standards Track August 2010 ISSN:

Transcription:

Internet Engineering Task Force (IETF) Request for Comments: 6549 Updates: 2328 Category: Standards Track ISSN: 2070-1721 A. Lindem Ericsson A. Roy S. Mirtorabi Cisco Systems March 2012 OSPFv2 Multi-Instance Extensions Abstract OSPFv3 includes a mechanism to support multiple instances of the protocol running on the same interface. OSPFv2 can utilize such a mechanism in order to support multiple routing domains on the same subnet. This document defines the OSPFv2 Instance ID to enable separate OSPFv2 protocol instances on the same interface. Unlike OSPFv3 where the Instance ID can be used for multiple purposes, such as putting the same interface in multiple areas, the OSPFv2 Instance ID is reserved for identifying protocol instances. This document updates RFC 2328. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6549. Lindem, et al. Standards Track [Page 1]

Copyright Notice Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction...2 1.1. Requirements Notation...3 2. OSPFv2 Instance Packet Encoding...3 3. OSPFv2 Interface Instance ID...4 3.1. Sending and Receiving OSPFv2 Packets...4 3.2. Interface Instance ID Values...4 4. State Sharing Optimizations between OSPFv2 Instances...5 5. OSPFv2 Authentication Impacts...5 6. Backward Compatibility and Deployment Considerations...5 7. Security Considerations...6 8. IANA Considerations...6 9. References...7 9.1. Normative References...7 9.2. Informative References...7 Appendix A. Acknowledgments......8 1. Introduction OSPFv3 [OSPFV3] includes a mechanism to support multiple instances of a protocol running on the same interface. OSPFv2 [OSPFV2] can utilize such a mechanism in order to support multiple routing domains on the same subnet. This document defines the OSPFv2 Instance ID to enable separate OSPFv2 protocol instances on the same interface. Unlike OSPFv3 where the Instance ID can be used for multiple purposes, such as putting the same interface in multiple areas, the OSPFv2 Instance ID is reserved for identifying protocol instances. Lindem, et al. Standards Track [Page 2]

1.1. Requirements Notation The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC-KEYWORDS]. 2. OSPFv2 Instance Packet Encoding This document extends OSPFv2 with a mechanism to differentiate packets for different instances sent and received on the same interface. In support of this capability, a modified packet header format with the Authentication Type field split into an Instance ID and AuType. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Version # Type Packet length Router ID Area ID Checksum Instance ID AuType Authentication Authentication The OSPFv2 Packet Header All fields are as defined in [OSPFV2] except that the Instance ID field is new, and the AuType field is reduced to 8 bits from 16 bits without any change in meaning. The Instance ID field is defined as follows: Instance ID Enables multiple instances of OSPFv2 to be used on a single interface. Each protocol instance would be assigned a separate Instance ID; the Instance ID has local subnet significance only. Received packets with an Instance ID not equal to one of the Instance IDs corresponding to one of the configured OSPFv2 Instances for the receiving interface MUST be discarded. Lindem, et al. Standards Track [Page 3]

3. OSPFv2 Interface Instance ID Section 9 of [OSPFV2] describes the conceptual interface data structure. The OSPFv2 Interface Instance ID is added to this structure. The OSPFv2 Interface Instance ID has a default value of 0. Setting it to a non-zero value may be accomplished through configuration. 3.1. Sending and Receiving OSPFv2 Packets When sending OSPFv2 packets, the OSPFv2 Interface Instance ID is set in the OSPFv2 packet header. When receiving OSPFv2 packets, the OSPFv2 Header Instance ID is used to aid in demultiplexing the packet and associating it with the correct OSPFv2 instance. Received packets with an Instance ID not equal to one of the configured OSPFv2 Instance IDs on the receiving interface MUST be discarded. 3.2. Interface Instance ID Values The following OSPFv2 Instance IDs have been defined: 0 Base IPv4 Instance - This is the default IPv4 routing instance corresponding to default IPv4 unicast routing and the attendant IPv4 routing table. Use of this Instance ID provides backward compatibility with the base OSPF specification [OSPFV2]. 1 Base IPv4 Multicast Instance - This IPv4 instance corresponds to the separate IPv4 routing table used for the Reverse Path Forwarding (RPF) checking performed on IPv4 multicast traffic. 2 Base IPv4 In-band Management Instance - This IPv4 instance corresponds to a separate IPv4 routing table used for network management applications. 3-127 Private Use - These Instance IDs are reserved for definition and semantics defined by the local network administrator. For example, separate Interface Instance IDs and their corresponding OSPFv2 instances could be used to support independent non-congruent topologies for different classes of IPv4 unicast traffic. The details of such deployments are beyond the scope of this document. The first three Interface Instance IDs are analogous to the topology IDs defined in [RFC4915]. Lindem, et al. Standards Track [Page 4]

4. State-Sharing Optimizations between OSPFv2 Instances This is beyond the scope of this document and is an area for further study. 5. OSPFv2 Authentication Impacts Now that the AuType OSPFv2 header field has been reduced from 2 octets to 1 octet, OSPFv2 routers not supporting this specification will fail packet authentication for any instance other than the default (i.e., the Base IPv4 Unicast Instance). This is solely due to the difference in field definition as opposed to any explicit change to OSPFv2 authentication, as described in Appendix D of RFC 2328 [OSPFV2] and RFC 5709 [RFC5709]. However, this is exactly what is desired since OSPFv2 routers not supporting this specification should only support the default instance (refer to Section 6). 6. Backward Compatibility and Deployment Considerations When there are OSPFv2 routers that support OSPFv2 Multi-Instance extensions on the same broadcast-capable interface as OSPFv2 routers that do not, packets with non-zero OSPFv2 header Instance IDs are received by those legacy OSPFv2 routers. Since the non-zero Instance ID is included in the AuType by these legacy OSPFv2 routers, it is misinterpreted as a mismatched authentication type and the packet is dropped. This is exactly what is expected and desired. Previously, there was concern that certain implementations would log every single authentication type mismatch. However, discussions with implementers have led us to the conclusion that this is not as severe a problem as we d first thought, and it will be even less of a problem by the time the mechanism described herein is standardized, implemented, and deployed. Most implementations will dampen the logging of errors. Hence, the more drastic mechanisms to avoid legacy OSPFv2 routers from receiving multicast OSPFv2 packets with non-zero Instance IDs have been removed. If the OSPF MIB as specified in [OSPF-MIB] is implemented, even the damped generation of the ospfifauthfailure or ospfvirtifauthfailure Simple Network Management Protocol (SNMP) notifications would be undesirable in situations where legacy OSPFv2 routers are deployed on the same subnet as OSPFv2 routers supporting this specification. Consequently, it is recommended that implementations that implement this specification and the OSPF MIB also implement SNMP Notification filtering as specified in Section 6 of [RFC3413]. Lindem, et al. Standards Track [Page 5]

7. Security Considerations The enhancement described herein doesn t include additional security considerations to OSPFv2. Security considerations for OSPFv2 are described in [OSPFV2]. Given that only three OSPFv2 authentication types have been standardized, it seems reasonable to reduce the OSPFv2 packet header field to 8 bits. 8. IANA Considerations The size of the AuType field is reduced from 16 octets to 8 octets. This changes the OSPF Authentication Codes registry in that the values 256-65535 are no longer defined and are therefore deprecated. There is no backward compatibility issue since this range of values was previously defined as "Reserved and should not be assigned". A new registry has been created for OSPFv2 Instance IDs. The initial allocation of OSPFv2 Instance IDs is described below. Refer to Section 3.2 for more information. +-------------+----------------------+--------------------+ Value/Range Designation Assignment Policy +-------------+----------------------+--------------------+ 0 Base IPv4 Unicast Assigned Instance 1 Base IPv4 Multicast Assigned Instance 2 Base IPv4 In-band Assigned Management Instance 3-127 Private Use Reserved for local policy assignment 128-255 Unassigned Standards Action +-------------+----------------------+--------------------+ OSPFv2 Instance ID Lindem, et al. Standards Track [Page 6]

9. References 9.1. Normative References [OSPFV2] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998. [OSPFV3] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF for IPv6", RFC 5340, July 2008. [RFC-KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. 9.2. Informative References [OSPF-MIB] Joyal, D., Ed., Galecki, P., Ed., Giacalone, S., Ed., Coltun, R., and F. Baker, "OSPF Version 2 Management Information Base", RFC 4750, December 2006. [RFC3413] Levi, D., Meyer, P., and B. Stewart, "Simple Network Management Protocol (SNMP) Applications", STD 62, RFC 3413, December 2002. [RFC4915] Psenak, P., Mirtorabi, S., Roy, A., Nguyen, L., and P. Pillay-Esnault, "Multi-Topology (MT) Routing in OSPF", RFC 4915, June 2007. [RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M., Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic Authentication", RFC 5709, October 2009. Lindem, et al. Standards Track [Page 7]

Appendix A. Acknowledgments Thanks to Adrian Farrel for reviewing and providing some suggested improvements during the IESG review. Thanks to Paul Wells for commenting on the backward compatibility issues. Thanks to Paul Wells and Vladica Stanisic for commenting during the OSPF WG last call. Thanks to Manav Bhatia for comments and for being the document shepherd. Thanks to Magnus Nystrom for comments under the auspices of the Security Directorate review. Thanks to Dan Romascanu for comments during the IESG review. Thanks to Pete McCann for comments under the auspices of the Gen-ART review. Lindem, et al. Standards Track [Page 8]

Authors Addresses Acee Lindem Ericsson 102 Carric Bend Court Cary, NC 27519 USA EMail: acee.lindem@ericsson.com Abhay Roy Cisco Systems 225 West Tasman Drive San Jose, CA 95134 USA EMail: akr@cisco.com Sina Mirtorabi Cisco Systems 3 West Plumeria Drive San Jose, CA 95134 USA EMail: sina@cisco.com Lindem, et al. Standards Track [Page 9]