Updates: 6126 May 2015 Category: Experimental ISSN: Extension Mechanism for the Babel Routing Protocol

Similar documents
Internet Engineering Task Force (IETF) Category: Informational. May IEEE Information Element for the IETF

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: S. Previdi. Cisco Systems

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: February 2016

Internet Engineering Task Force (IETF) Updates: 5451 March 2012 Category: Standards Track ISSN:

Category: Informational January 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2016

Internet Engineering Task Force (IETF) Request for Comments: 7189 Category: Standards Track March 2014 ISSN:

Request for Comments: 7314 Category: Experimental July 2014 ISSN: Extension Mechanisms for DNS (EDNS) EXPIRE Option.

Internet Engineering Task Force (IETF) Request for Comments: 7537 Updates: 4379, L. Andersson S. Aldrin Huawei Technologies May 2015

Internet Engineering Task Force (IETF) Updates: 4326 June 2014 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Updates: 2474 August 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: November 2015

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: January 2011

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Cisco May 2012

Internet Research Task Force (IRTF) Request for Comments: 6255 Category: Informational May 2011 ISSN:

Internet Engineering Task Force (IETF) Cisco Systems, Inc. April 2015

Internet Engineering Task Force (IETF) ISSN: April 2014

Internet Engineering Task Force (IETF) Request for Comments: 6028 Category: Experimental ISSN: October 2010

Internet Engineering Task Force (IETF) January 2014

Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015

February Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.

Internet Engineering Task Force (IETF) Request for Comments: ISSN: January 2010

Updates: 6126 (if approved) August 20, 2012 Intended status: Experimental Expires: February 21, 2013

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track May 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8142 Category: Standards Track April 2017 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: November 2012

Request for Comments: 8367 Category: Informational ISSN: April Wrongful Termination of Internet Protocol (IP) Packets

Expires: April 19, 2019 October 16, 2018

Internet Engineering Task Force

Internet Engineering Task Force (IETF) Request for Comments: 6994 Category: Standards Track August 2013 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7140 Category: Standards Track

Internet Engineering Task Force (IETF) Category: Standards Track. S. Aldrin Google, Inc. L. Ginsberg Cisco Systems November 2018

Internet Engineering Task Force (IETF) Request for Comments: March 2012

Category: Standards Track Cisco Systems D. Tappan Consultant October 2009

Independent Submission Request for Comments: 6812 Category: Informational. S. Thombare E. Yedavalli Cisco Systems January 2013

Internet Engineering Task Force (IETF) Category: Standards Track. Enterprise Architects February 2012

Internet Engineering Task Force (IETF) Request for Comments: 7973 Category: Informational ISSN: November 2016

Internet Engineering Task Force (IETF) Category: Standards Track. March 2017

Internet Engineering Task Force (IETF) Request for Comments: ISSN: August 2010

Internet Engineering Task Force (IETF) Category: Standards Track

Request for Comments: 7298 Updates: 6126 July 2014 Category: Experimental ISSN:

Internet Engineering Task Force (IETF) Nokia P. Pillay-Esnault Huawei USA January 2019

Internet Engineering Task Force (IETF) Category: Standards Track. S. Hegde Juniper Networks, Inc. S. Litkowski B. Decraene Orange July 2016

Internet Engineering Task Force

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: May 2018

Internet Engineering Task Force (IETF) June Network Time Protocol (NTP) Server Option for DHCPv6

Intended status: Standards Track. May 21, Assigned BGP extended communities draft-ietf-idr-reserved-extended-communities-03

Internet Engineering Task Force (IETF) Request for Comments: 8186 Category: Standards Track. June 2017

Internet Engineering Task Force (IETF) Request for Comments: 7319 BCP: 191 July 2014 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6379 Obsoletes: 4869 Category: Informational October 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7725 Category: Standards Track February 2016 ISSN:

Request for Comments: 5402 Category: Informational February 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015

Internet Engineering Task Force (IETF) Category: Standards Track. J. Halpern Ericsson E. Levy-Abegnoli, Ed. Cisco February 2017

Internet Engineering Task Force (IETF) Updates: 5614 October 2013 Category: Experimental ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track. A. Langley Google Inc. E. Stephan Orange July 2014

Internet Engineering Task Force (IETF) Request for Comments: 8035 Updates: 5761 November 2016 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track March 2015 ISSN:

Internet Engineering Task Force (IETF) Category: Informational. August IANA Registration for the Cryptographic Algorithm Object Identifier Range

Internet Engineering Task Force (IETF) Request for Comments: 5736 Category: Informational. ICANN January 2010

Updates: 6126 (if approved) March 11, 2013 Intended status: Experimental Expires: September 12, 2013

Internet Engineering Task Force (IETF) Updates: 5885 Category: Standards Track July 2016 ISSN:

Internet Engineering Task Force (IETF) Category: Best Current Practice. Cisco Systems July IPv6 Prefix Length Recommendation for Forwarding

Internet Engineering Task Force (IETF) Request for Comments: 7881 Category: Standards Track. Big Switch Networks July 2016

Internet Engineering Task Force (IETF) Category: Informational March 2016 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7078 Category: Standards Track. University of Southampton January 2014

Internet Engineering Task Force (IETF) Request for Comments: Category: Experimental February 2014 ISSN:

Updates: 6126 (if approved) March 21, 2014 Intended status: Experimental Expires: September 22, 2014

Internet Engineering Task Force (IETF) Request for Comments: 8336 Category: Standards Track. March 2018

Internet Engineering Task Force (IETF) Request for Comments: 6309

Prefer Header for HTTP

Request for Comments: 6592 Category: Informational 1 April 2012 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track. R. Asati Cisco January 2013

Internet Engineering Task Force (IETF) Huawei Technologies Co., Ltd.

Internet Engineering Task Force (IETF) Category: Standards Track

Network Working Group. Obsoletes: 3452, 3695 March 2009 Category: Standards Track

Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status

TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2018

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017

Internet Engineering Task Force (IETF) Category: Standards Track April 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6522 STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: ISSN: April 2011

Internet Engineering Task Force (IETF) Request for Comments: 8237 Category: Standards Track ISSN: E. Bellagamba Ericsson October 2017

DHCPv6 Option for IPv4-Embedded Multicast and Unicast IPv6 Prefixes

Internet Engineering Task Force (IETF) Request for Comments: 7125 Category: Informational. February 2014

Internet Engineering Task Force (IETF) Updates: 5931 April 2017 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Alcatel-Lucent January 2016

Internet Engineering Task Force (IETF) Request for Comments: Google K. Patel Cisco Systems August 2015

Internet Engineering Task Force (IETF) Request for Comments: 7504 June 2015 Updates: 1846, 5321 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6961 June 2013 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) April 2012

Internet Engineering Task Force (IETF) Category: Informational. Juniper Networks May 2017

Internet Engineering Task Force (IETF) Request for Comments: 8191 Category: Standards Track. X. Lee CNNIC. August 2017

Internet Engineering Task Force (IETF) Updates: 6376 January 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7330 Category: Standards Track. Cisco Systems August 2014

Request for Comments: 8112 Category: Informational. I. Kouvelas Arista D. Lewis Cisco Systems May 2017

Internet Engineering Task Force (IETF) Request for Comments: 6725 Category: Standards Track August 2012 ISSN:

Transcription:

Independent Submission J. Chroboczek Request for Comments: 7557 PPS, University of Paris-Diderot Updates: 6126 May 2015 Category: Experimental ISSN: 2070-1721 Abstract Extension Mechanism for the Babel Routing Protocol This document defines the encoding of extensions to the Babel routing protocol, as specified in RFC 6126. Status of This Memo This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation. This document defines an Experimental Protocol for the Internet community. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7557. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Chroboczek Experimental [Page 1]

Table of Contents 1. Introduction........................ 2 2. Mechanisms for Extending the Babel Protocol......... 3 2.1. New Versions of the Babel Protocol........... 3 2.2. New TLVs........................ 3 2.3. Sub-TLVs........................ 4 2.4. The Flags Field..................... 4 2.5. Packet Trailer..................... 5 3. Format of Sub-TLVs..................... 5 3.1. Sub-TLVs Specified in This Document........... 5 3.2. Unknown Sub-TLVs.................... 6 4. Choosing between Extension Mechanisms............ 6 5. IANA Considerations..................... 7 6. Security Considerations................... 9 7. References......................... 10 7.1. Normative References.................. 10 7.2. Informative References................. 10 Acknowledgments......................... 10 Author s Address........................ 11 1. Introduction A Babel packet [RFC6126] contains a header followed by a sequence of TLVs, each of which is a sequence of octets having an explicit type and length. The original Babel protocol has the following provisions for including extension data: o A Babel packet with a version number different from 2 MUST be silently ignored ([RFC6126], Section 4.2). o An unknown TLV MUST be silently ignored ([RFC6126], Section 4.3). o Except for Pad1 and PadN, all TLVs are self-terminating, and any extra data included in a TLV MUST be silently ignored ([RFC6126], Section 4.2). o The Flags field of the Update TLV contains 6 undefined bits that MUST be silently ignored ([RFC6126], Section 4.4.9). o Any data following the last TLV of a Babel packet MUST be silently ignored ([RFC6126], Section 4.2). Each of these provisions provides a place to store data needed by extensions of the Babel protocol. However, in the absence of any further conventions, independently developed extensions to the Babel protocol might make conflicting uses of the available space, and therefore lead to implementations that would fail to interoperate. Chroboczek Experimental [Page 2]

This document formalises a set of rules for extending the Babel protocol that are designed to ensure that no such incompatibilities arise, and that are currently respected by a number of deployed extensions. In the rest of this document, we use the term "original protocol" for the protocol defined in [RFC6126], and "extended protocol" for any extension of the Babel protocol that follows the rules set out in this document. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 2. Mechanisms for Extending the Babel Protocol This section describes each of the mechanisms available for extending the Babel protocol. 2.1. New Versions of the Babel Protocol The header of a Babel packet contains an eight-bit protocol version. The current version of the Babel protocol is version 2; any packets containing a version number different from 2 MUST be silently ignored. Versions 0 and 1 were earlier experimental versions of the Babel protocol that have seen some modest deployment; these version numbers SHOULD NOT be reused by future versions of the Babel protocol. Version numbers larger than 2 might be used by a future incompatible protocol. 2.2. New TLVs An extension may carry its data in a new TLV type. Such new TLVs will be silently ignored by implementations of the original Babel protocol, as well as by other extended implementations of the Babel protocol, as long as the TLV types do not collide. All new TLVs MUST have the format defined in [RFC6126], Section 4.3. New TLVs SHOULD be self-terminating, in the sense defined in the next section, and any data found after the main data section of the TLV SHOULD be treated as a series of sub-tlvs. TLV types 224 through 254 are reserved for Experimental Use [RFC3692]. TLV type 255 is reserved for expansion of the TLV type space, in the unlikely event that eight bits turn out not to be enough. Chroboczek Experimental [Page 3]

2.3. Sub-TLVs With the exception of the Pad1 TLV, all Babel TLVs carry an explicit length. With the exception of Pad1 and PadN, all TLVs defined by the original protocol are self-terminating, in the sense that the length of the meaningful data that they contain (the "natural length") can be determined without reference to the explicitly encoded length. In some cases, the natural length is trivial to determine: for example, a HELLO TLV always has a natural length of 2 (4 including the Type and Length fields). In other cases, determining the natural length is not that easy, but this needs to be done anyway by an implementation that interprets the given TLV. For example, the natural length of an Update TLV depends on both the prefix length and the amount of prefix compression being performed. If the explicit length of a TLV defined by the original protocol is larger than its natural length, the extra space present in the TLV is silently ignored by an implementation of the original protocol; extended implementations MAY use it to store arbitrary data and SHOULD structure the additional data as a sequence of sub-tlvs. Unlike TLVs, the sub-tlvs themselves need not be self-terminating. An extension MAY be assigned one or more sub-tlv types. Sub-TLV types are assigned independently from TLV types: the same numeric type can be assigned to a TLV and a sub-tlv. Sub-TLV types are assigned globally: once an extension is assigned a given sub-tlv number, it MAY use this number within any TLV. However, the interpretation of a given sub-tlv type can depend on which particular TLV it is embedded within. Sub-TLV types 224 through 254 are reserved for Experimental Use [RFC3692]. TLV type 255 is reserved for expansion of the sub-tlv type space, in the unlikely event that eight bits turn out not to be enough. The format of sub-tlvs is defined in Section 3 below. 2.4. The Flags Field The Flags field is an eight-bit field in the Update TLV. Bits 0 and 1 (the bits with values 80 and 40 hexadecimal) are defined by the original protocol and MUST be recognised and used by every implementation. The remaining six bits are not currently used and are silently ignored by implementations of the original protocol. Due to the small size of the Flags field, it is NOT RECOMMENDED that one or more bits be assigned to an extension; a sub-tlv SHOULD be assigned instead. An implementation MUST ignore any bits in the Flags field that it does not know about and MUST send them as zero. Chroboczek Experimental [Page 4]

2.5. Packet Trailer A Babel packet carries an explicit length in its header. A Babel packet is carried by a UDP datagram, which in turn contains an explicit length in its header. It is possible for a UDP datagram carrying a Babel packet to be larger than the size of the Babel packet. In that case, the extra space after the Babel packet, known as the packet trailer, is silently ignored by an implementation of the original protocol. The packet trailer was originally intended to be used as a cryptographic trailer. However, the authentication extension to Babel [RFC7298] ended up using a pair of new TLVs, and no currently deployed extension of Babel uses the packet trailer. The format and purpose of the packet trailer is therefore currently left undefined. 3. Format of Sub-TLVs A sub-tlv has exactly the same structure as a TLV. Except for Pad1 (Section 3.1.1), all sub-tlvs have the following structure: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type Length Body... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- Fields: Type Length Body The type of the sub-tlv. The length of the body, in octets, exclusive of the Type and Length fields. The sub-tlv body, the interpretation of which depends on both the type of the sub-tlv and the type of the TLV within which it is embedded. 3.1. Sub-TLVs Specified in This Document This document defines two types of sub-tlvs, Pad1 and PadN. These two sub-tlvs MUST be correctly parsed and ignored by any extended implementation of the Babel protocol that uses sub-tlvs. Chroboczek Experimental [Page 5]

3.1.1. Pad1 0 0 1 2 3 4 5 6 7 +-+-+-+-+-+-+-+-+ Type = 0 +-+-+-+-+-+-+-+-+ Fields: Type Set to 0 to indicate a Pad1 sub-tlv. This sub-tlv is silently ignored on reception. 3.1.2. PadN 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type = 1 Length MBZ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- Fields: Type Length MBZ Set to 1 to indicate a PadN sub-tlv. The length of the body, in octets, exclusive of the Type and Length fields. Set to 0 on transmission. This sub-tlv is silently ignored on reception. 3.2. Unknown Sub-TLVs Any unknown sub-tlv MUST be silently ignored by an extended implementation that uses sub-tlvs. 4. Choosing between Extension Mechanisms New versions of the Babel protocol should only be defined if the new version is not backwards compatible with the original protocol. In many cases, an extension could be implemented either by defining a new TLV or by adding a new sub-tlv to an existing TLV. For example, an extension whose purpose is to attach additional data to route updates can be implemented either by creating a new "enriched" Update TLV or by adding a sub-tlv to the Update TLV. Chroboczek Experimental [Page 6]

The two encodings are treated differently by implementations that do not understand the extension. In the case of a new TLV, the whole unknown TLV is ignored by an implementation of the original protocol, while in the case of a new sub-tlv, the TLV is parsed and acted upon, and the unknown sub-tlv is silently ignored. Therefore, a sub-tlv should be used by extensions that extend the Update in a compatible manner (the extension data may be silently ignored), while a new TLV must be used by extensions that make incompatible extensions to the meaning of the TLV (the whole TLV must be thrown away if the extension data is not understood). Using a new bit in the Flags field is equivalent to defining a new sub-tlv while using less space in the Babel packet. Due to the limited Flags space, and the doubtful space savings, we do not recommend the use of bits in the Flags field -- a new sub-tlv should be used instead. We refrain from making any recommendations about the usage of the packet trailer due to the lack of implementation experience. 5. IANA Considerations IANA has created three new registries, called "Babel TLV Types", "Babel Sub-TLV Types", and "Babel Flags Values". The allocation policy for each of these registries is Specification Required [RFC5226]. Chroboczek Experimental [Page 7]

The initial values in the "Babel TLV Types" registry are as follows: Type Name Reference 0 Pad1 [RFC6126] 1 PadN [RFC6126] 2 Acknowledgment Request [RFC6126] 3 Acknowledgment [RFC6126] 4 Hello [RFC6126] 5 IHU [RFC6126] 6 Router-Id [RFC6126] 7 Next Hop [RFC6126] 8 Update [RFC6126] 9 Route Request [RFC6126] 10 Seqno Request [RFC6126] 11 TS/PC [RFC7298] 12 HMAC [RFC7298] 13 Source-specific Update [BABEL-SS] 14 Source-specific Request [BABEL-SS] 15 Source-specific Seqno Request [BABEL-SS] 224-254 Reserved for Experimental Use this document 255 Reserved for expansion of the type this document space Chroboczek Experimental [Page 8]

The initial values in the "Babel Sub-TLV Types" registry are as follows: Type Name Reference 0 Pad1 this document 1 PadN this document 2 Diversity [BABEL-DIV] 3 Timestamp [BABEL-RTT] 224-254 Reserved for Experimental Use this document 255 Reserved for expansion of the type this document space The initial values in the "Babel Flags Values" registry are as follows: 6. Security Considerations +-----+-------------------+-----------+ Bit Name Reference +-----+-------------------+-----------+ 0 Default prefix [RFC6126] 1 Default router-id [RFC6126] 2-7 Unassigned +-----+-------------------+-----------+ This document specifies the structure of fields that are already present in the original Babel protocol and does not, by itself, raise any new security considerations. Specific extensions may change the security properties of the protocol, for example, by adding security mechanisms [RFC7298] or by enabling new kinds of attack. Chroboczek Experimental [Page 9]

7. References 7.1. Normative References [RFC2119] [RFC3692] [RFC5226] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <http://www.rfc-editor.org/info/rfc2119>. Narten, T., "Assigning Experimental and Testing Numbers Considered Useful", BCP 82, RFC 3692, DOI 10.17487/RFC3692, January 2004, <http://www.rfc-editor.org/info/rfc3692>. Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, DOI 10.17487/RFC5226, May 2008, <http://www.rfc-editor.org/info/rfc5226>. [RFC6126] Chroboczek, J., "The Babel Routing Protocol", RFC 6126, DOI 10.17487/RFC6126, April 2011, <http://www.rfc-editor.org/info/rfc6126>. 7.2. Informative References [BABEL-DIV] Chroboczek, J., "Diversity Routing for the Babel Routing Protocol", Work in Progress, draft-chroboczek-babeldiversity-routing-00, July 2014. [BABEL-RTT] Jonglez, B. and J. Chroboczek, "Delay-based Metric Extension for the Babel Routing Protocol", Work in Progress, draft-jonglez-babel-rtt-extension-01, May 2015. [BABEL-SS] Boutier, M. and J. Chroboczek, "Source-Specific Routing in Babel", Work in Progress, draft-boutier-babelsource-specific-01, May 2015. [RFC7298] Ovsienko, D., "Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication", RFC 7298, DOI 10.17487/RFC7298, July 2014, <http://www.rfc-editor.org/info/rfc7298>. Chroboczek Experimental [Page 10]

Acknowledgments I am grateful to Denis Ovsienko and Gabriel Kerneis for their feedback on previous draft versions of this document. Author s Address Juliusz Chroboczek PPS, University of Paris-Diderot Case 7014 75205 Paris Cedex 13 France EMail: jch@pps.univ-paris-diderot.fr Chroboczek Experimental [Page 11]