diff options
Diffstat (limited to 'doc/rfc/rfc1388.txt')
-rw-r--r-- | doc/rfc/rfc1388.txt | 395 |
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc1388.txt b/doc/rfc/rfc1388.txt new file mode 100644 index 0000000..3b4609d --- /dev/null +++ b/doc/rfc/rfc1388.txt @@ -0,0 +1,395 @@ + + + + + + +Network Working Group G. Malkin +Request for Comments: 1388 Xylogics, Inc. +Updates: RFC 1058 January 1993 + + + RIP Version 2 + Carrying Additional Information + +Status of this Memo + + This RFC specifies an IAB standards track protocol for the Internet + community, and requests discussion and suggestions for improvements. + Please refer to the current edition of the "IAB Official Protocol + Standards" for the standardization state and status of this protocol. + Distribution of this memo is unlimited. + +Abstract + + This document specifies an extension of the Routing Information + Protocol (RIP), as defined in [1], to expand the amount of useful + information carried in RIP packets and to add a measure of security. + A companion document will define the SNMP MIB objects for RIP-2 [2]. + +Acknowledgements + + I would like to thank the following for their contributions to this + document: Fred Baker, Noel Chiappa and Vince Fuller. This memo is a + product of the RIP-2 Working Group of the Internet Engineering Task + Force (IETF). + +Table of Contents + + 1. Justification . . . . . . . . . . . . . . . . . . . . . . . . . 2 + 2. Current RIP . . . . . . . . . . . . . . . . . . . . . . . . . . 2 + 3. Protocol Extensions . . . . . . . . . . . . . . . . . . . . . . 2 + 3.1 Authentication . . . . . . . . . . . . . . . . . . . . . . . 3 + 3.2 Routing Domain . . . . . . . . . . . . . . . . . . . . . . . 4 + 3.3 Route Tag . . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 3.4 Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 3.5 Next Hop . . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 3.6 Multicasting . . . . . . . . . . . . . . . . . . . . . . . . 5 + 4. Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . 5 + 4.1 Compatibility Switch . . . . . . . . . . . . . . . . . . . . 5 + 4.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . 6 + 4.3 Larger Infinity . . . . . . . . . . . . . . . . . . . . . . . 6 + 4.4 Addressless Links . . . . . . . . . . . . . . . . . . . . . . 6 + Appendix A . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 + References . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 + + + +Malkin [Page 1] + +RFC 1388 RIP Version 2 January 1993 + + + Security Considerations . . . . . . . . . . . . . . . . . . . . . . 7 + Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 7 + +1. Justification + + With the advent of OSPF and IS-IS, there are those who believe that + RIP is obsolete. While it is true that the newer IGP routing + protocols are far superior to RIP, RIP does have some advantages. + Primarily, in a small network, RIP has very little overhead in terms + of bandwidth used and configuration and management time. RIP is also + very easy to implement, especially in relation to the newer IGPs. + + Additionally, there are many, many more RIP implementations in the + field than OSPF and IS-IS combined. It is likely to remain that way + for some years yet. + + Given that RIP will be useful in many environments for some period of + time, it is reasonable to increase RIP's usefulness. This is + especially true since the gain is far greater than the expense of the + change. + +2. Current RIP + + The current RIP packet contains the minimal amount of information + necessary for routers to route packets through a network. It also + contains a large amount of unused space, owing to its origins. + + The current RIP protocol does not consider autonomous systems and + IGP/EGP interactions, subnetting, and authentication since + implementations of these postdate RIP. The lack of subnet masks is a + particularly serious problem for routers since they need a subnet + mask to know how to determine a route. If a RIP route is a network + route (all non-network bits 0), the subnet mask equals the network + mask. However, if some of the non-network bits are set, the router + cannot determine the subnet mask. Worse still, the router cannot + determine if the RIP route is a subnet route or a host route. + Currently, some routers simply choose the subnet mask of the + interface over which the route was learned and determine the route + type from that. + +3. Protocol Extensions + + This document does not change the RIP protocol per se. Rather, it + provides extensions to the datagram format which allows routers to + share important additional information. + + + + + + +Malkin [Page 2] + +RFC 1388 RIP Version 2 January 1993 + + + The new RIP datagram format is: + + 0 1 2 3 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Command (1) | Version (1) | Routing Domain (2) | + +---------------+---------------+-------------------------------+ + | Address Family Identifier (2) | Route Tag (2) | + +-------------------------------+-------------------------------+ + | IP Address (4) | + +---------------------------------------------------------------+ + | Subnet Mask (4) | + +---------------------------------------------------------------+ + | Next Hop (4) | + +---------------------------------------------------------------+ + | Metric (4) | + +---------------------------------------------------------------+ + + The Command, Address Family Identifier (AFI), IP Address, and Metric + all have the meanings defined in RFC 1058. The Version field will + specify version number 2 for RIP datagrams which use authentication + or carry information in any of the newly defined fields. + + All fields are coded in IP network byte order (big-endian). + +3.1 Authentication + + Since authentication is a per packet function, and since there is + only one 2-byte field available in the packet header, and since any + reasonable authentication scheme will require more than two bytes, + the authentication scheme for RIP version 2 will use the space of an + entire RIP entry. If the Address Family Identifier of the first (and + only the first) entry in the packet is 0xFFFF, then the remainder of + the entry contains the authentication. This means that there can be, + at most, 24 RIP entries in the remainder of the packet. If + authentication is not in use, then no entries in the packet should + have an Address Family Identifier of 0xFFFF. A RIP packet which + contains an authentication entry would have the following format: + + 0 1 2 3 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Command (1) | Version (1) | Routing Domain (2) | + +---------------+---------------+-------------------------------+ + | 0xFFFF | Authentication Type (2) | + +-------------------------------+-------------------------------+ + ~ Authentication (16) ~ + +---------------------------------------------------------------+ + + + +Malkin [Page 3] + +RFC 1388 RIP Version 2 January 1993 + + + Currently, the only Authentication Type is simple password and it is + type 2. The remaining 16 bytes contain the plain text password. If + the password is under 16 bytes, it must be left-justified and padded + to the right with nulls (0x00). + +3.2 Routing Domain + + The Routing Domain (RD) number is the number of the routing process + to which this update belongs. This field is used to associate the + routing update to a specific routing process on the receiving router. + The RD is needed to allow multiple, independent RIP "clouds" to co- + exist on the same physical wire. This gives administrators the + ability to run multiple, possibly parallel, instances of RIP in order + to implement simple policy. This means that a router operating + within one routing domain, or a set of routing domains, should ignore + RIP packets which belong to another routing domain. RD 0 is the + default routing domain. + +3.3 Route Tag + + The Route Tag (RT) field exists as a support for EGPs. The contents + and use of this field are outside the scope of this protocol. + However, it is expected that the field will be used to carry + Autonomous System numbers for EGP and BGP. Any RIP system which + receives a RIP entry which contains a non-zero RT value must re- + advertise that value. Those routes which have no RT value must + advertise an RT value of zero. + +3.4 Subnet mask + + The Subnet Mask field contains the subnet mask which is applied to + the IP address to yield the non-host portion of the address. If this + field is zero, then no subnet mask has been included for this entry. + + On an interface where a RIP-1 router may hear and operate on the + information in a RIP-2 routing entry the following two rules apply: + + 1) information internal to one network must never be advertised into + another network, and + + 2) information about a more specific subnet may not be advertised + where RIP-1 routers would consider it a host route. + +3.5 Next Hop + + The immediate next hop IP address to which packets to the destination + specified by this route entry should be forwarded. Specifying a + value of 0.0.0.0 in this field indicates that routing should be via + + + +Malkin [Page 4] + +RFC 1388 RIP Version 2 January 1993 + + + the originator of the RIP advertisement. An address specified as a + next hop must, per force, be directly reachable on the logical subnet + over which the advertisement is made. + + The purpose of the Next Hop field is to eliminate packets being + routed through extra hops in the system. It is particularly useful + when RIP is not being run on all of the routers on a network. A + simple example is given in Appendix A. Note that Next Hop is an + "advisory" field. That is, if the provided information is ignored, a + possibly sub-optimal, but absolutely valid, route may be taken. + +3.6 Multicasting + + In order to reduce unnecessary load on those hosts which are not + listening to RIP-2 packets, an IP multicast address will be used for + periodic broadcasts. The IP multicast address is 224.0.0.9. Note + that IGMP is not needed since these are inter-router messages which + are not forwarded. + + In order to maintain backwards compatibility, the use of the + multicast address will be configurable, as described in section 4.1. + If multicasting is used, it should be used on all interfaces which + support it. + +4. Compatibility + + RFC 1058 showed considerable forethought in its specification of the + handling of version numbers. It specifies that RIP packets of + version 0 are to be discarded, that RIP packets of version 1 are to + be discarded if any Must Be Zero (MBZ) field is non-zero, and that + RIP packets of any version greater than 1 should not be discarded + simply because an MBZ field contains a value other than zero. This + means that the new version of RIP is totally backwards compatible + with existing RIP implementations which adhere to this part of the + specification. + +4.1 Compatibility Switch + + A compatibility switch is necessary for two reasons. First, there + are implementations of RIP-1 in the field which do not follow RFC + 1058 as described above. Second, the use of multicasting would + prevent RIP-1 systems from receiving RIP-2 updates (which may be a + desired feature in some cases). + + The switch has three settings: RIP-1, in which only RIP-1 packets are + sent; RIP-1 compatibility, in which RIP-2 packets are broadcast; and + RIP-2, in which RIP-2 packets are multicast. The recommended default + for this switch is RIP-1 compatibility. + + + +Malkin [Page 5] + +RFC 1388 RIP Version 2 January 1993 + + +4.2 Authentication + + Since an authentication entry is marked with an Address Family + Identifier of 0xFFFF, a RIP-1 system would ignore this entry since it + would belong to an address family other than IP. It should be noted, + therefore, that use of authentication will not prevent RIP-1 systems + from seeing RIP-2 packets. If desired, this may be done using + multicasting, as described in sections 3.6 and 4.1. + +4.3 Larger Infinity + + While on the subject of compatibility, there is one item which people + have requested: increasing infinity. The primary reason that this + cannot be done is that it would violate backwards compatibility. A + larger infinity would obviously confuse older versions of rip. At + best, they would ignore the route as they would ignore a metric of + 16. There was also a proposal to make the Metric a single byte and + reuse the high three bytes, but this would break any implementations + which treat the metric as a long. + +4.4 Addressless Links + + As in RIP-1, addressless links will not be supported by RIP-2. + +Appendix A + + This is a simple example of the use of the next hop field in a rip + entry. + + ----- ----- ----- ----- ----- ----- + |IR1| |IR2| |IR3| |XR1| |XR2| |XR3| + --+-- --+-- --+-- --+-- --+-- --+-- + | | | | | | + --+-------+-------+---------------+-------+-------+-- + <-------------RIP-2-------------> + + Assume that IR1, IR2, and IR3 are all "internal" routers which are + under one administration (e.g., a campus) which has elected to use + RIP-2 as its IGP. XR1, XR2, and XR3, on the other hand, are under + separate administration (e.g., a regional network, of which the + campus is a member) and are using some other routing protocol (e.g., + OSPF). XR1, XR2, and XR3 exchange routing information among + themselves such that they know that the best routes to networks N1 + and N2 are via XR1, to N3, N4, and N5 are via XR2, and to N6 and N7 + are via XR3. By setting the Next Hop field correctly (to XR2 for + N3/N4/N5, to XR3 for N6/N7), only XR1 need exchange RIP-2 routes with + IR1/IR2/IR3 for routing to occur without additional hops through XR1. + Without the Next Hop (for example, if RIP-1 were used) it would be + + + +Malkin [Page 6] + +RFC 1388 RIP Version 2 January 1993 + + + necessary for XR2 and XR3 to also participate in the RIP-2 protocol + to eliminate extra hops. + +References + + [1] Hedrick, C., "Routing Information Protocol", RFC 1058, Rutgers + University, June 1988. + + [2] Malkin, G., and F. Baker, "RIP Version 2 MIB Extension", RFC + 1389, Xylogics, Inc., Advanced Computer Communications, January + 1993. + + [3] Malkin, G., "RIP Version 2 Protocol Analysis", RFC 1387, + Xylogics, Inc., January 1993. + +Security Considerations + + The basic RIP protocol is not a secure protocol. To bring RIP-2 in + line with more modern routing protocols, an extensible authentication + mechanism has been incorporated into the protocol enhancements. This + mechanism is described in sections 3.1 and 4.2. + +Author's Address + + Gary Scott Malkin + Xylogics, Inc. + 53 Third Avenue + Burlington, MA 01803 + + Phone: (617) 272-8140 + EMail: gmalkin@Xylogics.COM + + + + + + + + + + + + + + + + + + + + +Malkin [Page 7] +
\ No newline at end of file |