summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1388.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc1388.txt')
-rw-r--r--doc/rfc/rfc1388.txt395
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc1388.txt b/doc/rfc/rfc1388.txt
new file mode 100644
index 0000000..3b4609d
--- /dev/null
+++ b/doc/rfc/rfc1388.txt
@@ -0,0 +1,395 @@
+
+
+
+
+
+
+Network Working Group G. Malkin
+Request for Comments: 1388 Xylogics, Inc.
+Updates: RFC 1058 January 1993
+
+
+ RIP Version 2
+ Carrying Additional Information
+
+Status of this Memo
+
+ This RFC specifies an IAB standards track protocol for the Internet
+ community, and requests discussion and suggestions for improvements.
+ Please refer to the current edition of the "IAB Official Protocol
+ Standards" for the standardization state and status of this protocol.
+ Distribution of this memo is unlimited.
+
+Abstract
+
+ This document specifies an extension of the Routing Information
+ Protocol (RIP), as defined in [1], to expand the amount of useful
+ information carried in RIP packets and to add a measure of security.
+ A companion document will define the SNMP MIB objects for RIP-2 [2].
+
+Acknowledgements
+
+ I would like to thank the following for their contributions to this
+ document: Fred Baker, Noel Chiappa and Vince Fuller. This memo is a
+ product of the RIP-2 Working Group of the Internet Engineering Task
+ Force (IETF).
+
+Table of Contents
+
+ 1. Justification . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Current RIP . . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 3. Protocol Extensions . . . . . . . . . . . . . . . . . . . . . . 2
+ 3.1 Authentication . . . . . . . . . . . . . . . . . . . . . . . 3
+ 3.2 Routing Domain . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.3 Route Tag . . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.4 Subnet Mask . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.5 Next Hop . . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.6 Multicasting . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 4. Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 4.1 Compatibility Switch . . . . . . . . . . . . . . . . . . . . 5
+ 4.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . 6
+ 4.3 Larger Infinity . . . . . . . . . . . . . . . . . . . . . . . 6
+ 4.4 Addressless Links . . . . . . . . . . . . . . . . . . . . . . 6
+ Appendix A . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ References . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
+
+
+
+Malkin [Page 1]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+ Security Considerations . . . . . . . . . . . . . . . . . . . . . . 7
+ Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 7
+
+1. Justification
+
+ With the advent of OSPF and IS-IS, there are those who believe that
+ RIP is obsolete. While it is true that the newer IGP routing
+ protocols are far superior to RIP, RIP does have some advantages.
+ Primarily, in a small network, RIP has very little overhead in terms
+ of bandwidth used and configuration and management time. RIP is also
+ very easy to implement, especially in relation to the newer IGPs.
+
+ Additionally, there are many, many more RIP implementations in the
+ field than OSPF and IS-IS combined. It is likely to remain that way
+ for some years yet.
+
+ Given that RIP will be useful in many environments for some period of
+ time, it is reasonable to increase RIP's usefulness. This is
+ especially true since the gain is far greater than the expense of the
+ change.
+
+2. Current RIP
+
+ The current RIP packet contains the minimal amount of information
+ necessary for routers to route packets through a network. It also
+ contains a large amount of unused space, owing to its origins.
+
+ The current RIP protocol does not consider autonomous systems and
+ IGP/EGP interactions, subnetting, and authentication since
+ implementations of these postdate RIP. The lack of subnet masks is a
+ particularly serious problem for routers since they need a subnet
+ mask to know how to determine a route. If a RIP route is a network
+ route (all non-network bits 0), the subnet mask equals the network
+ mask. However, if some of the non-network bits are set, the router
+ cannot determine the subnet mask. Worse still, the router cannot
+ determine if the RIP route is a subnet route or a host route.
+ Currently, some routers simply choose the subnet mask of the
+ interface over which the route was learned and determine the route
+ type from that.
+
+3. Protocol Extensions
+
+ This document does not change the RIP protocol per se. Rather, it
+ provides extensions to the datagram format which allows routers to
+ share important additional information.
+
+
+
+
+
+
+Malkin [Page 2]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+ The new RIP datagram format is:
+
+ 0 1 2 3 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Command (1) | Version (1) | Routing Domain (2) |
+ +---------------+---------------+-------------------------------+
+ | Address Family Identifier (2) | Route Tag (2) |
+ +-------------------------------+-------------------------------+
+ | IP Address (4) |
+ +---------------------------------------------------------------+
+ | Subnet Mask (4) |
+ +---------------------------------------------------------------+
+ | Next Hop (4) |
+ +---------------------------------------------------------------+
+ | Metric (4) |
+ +---------------------------------------------------------------+
+
+ The Command, Address Family Identifier (AFI), IP Address, and Metric
+ all have the meanings defined in RFC 1058. The Version field will
+ specify version number 2 for RIP datagrams which use authentication
+ or carry information in any of the newly defined fields.
+
+ All fields are coded in IP network byte order (big-endian).
+
+3.1 Authentication
+
+ Since authentication is a per packet function, and since there is
+ only one 2-byte field available in the packet header, and since any
+ reasonable authentication scheme will require more than two bytes,
+ the authentication scheme for RIP version 2 will use the space of an
+ entire RIP entry. If the Address Family Identifier of the first (and
+ only the first) entry in the packet is 0xFFFF, then the remainder of
+ the entry contains the authentication. This means that there can be,
+ at most, 24 RIP entries in the remainder of the packet. If
+ authentication is not in use, then no entries in the packet should
+ have an Address Family Identifier of 0xFFFF. A RIP packet which
+ contains an authentication entry would have the following format:
+
+ 0 1 2 3 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Command (1) | Version (1) | Routing Domain (2) |
+ +---------------+---------------+-------------------------------+
+ | 0xFFFF | Authentication Type (2) |
+ +-------------------------------+-------------------------------+
+ ~ Authentication (16) ~
+ +---------------------------------------------------------------+
+
+
+
+Malkin [Page 3]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+ Currently, the only Authentication Type is simple password and it is
+ type 2. The remaining 16 bytes contain the plain text password. If
+ the password is under 16 bytes, it must be left-justified and padded
+ to the right with nulls (0x00).
+
+3.2 Routing Domain
+
+ The Routing Domain (RD) number is the number of the routing process
+ to which this update belongs. This field is used to associate the
+ routing update to a specific routing process on the receiving router.
+ The RD is needed to allow multiple, independent RIP "clouds" to co-
+ exist on the same physical wire. This gives administrators the
+ ability to run multiple, possibly parallel, instances of RIP in order
+ to implement simple policy. This means that a router operating
+ within one routing domain, or a set of routing domains, should ignore
+ RIP packets which belong to another routing domain. RD 0 is the
+ default routing domain.
+
+3.3 Route Tag
+
+ The Route Tag (RT) field exists as a support for EGPs. The contents
+ and use of this field are outside the scope of this protocol.
+ However, it is expected that the field will be used to carry
+ Autonomous System numbers for EGP and BGP. Any RIP system which
+ receives a RIP entry which contains a non-zero RT value must re-
+ advertise that value. Those routes which have no RT value must
+ advertise an RT value of zero.
+
+3.4 Subnet mask
+
+ The Subnet Mask field contains the subnet mask which is applied to
+ the IP address to yield the non-host portion of the address. If this
+ field is zero, then no subnet mask has been included for this entry.
+
+ On an interface where a RIP-1 router may hear and operate on the
+ information in a RIP-2 routing entry the following two rules apply:
+
+ 1) information internal to one network must never be advertised into
+ another network, and
+
+ 2) information about a more specific subnet may not be advertised
+ where RIP-1 routers would consider it a host route.
+
+3.5 Next Hop
+
+ The immediate next hop IP address to which packets to the destination
+ specified by this route entry should be forwarded. Specifying a
+ value of 0.0.0.0 in this field indicates that routing should be via
+
+
+
+Malkin [Page 4]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+ the originator of the RIP advertisement. An address specified as a
+ next hop must, per force, be directly reachable on the logical subnet
+ over which the advertisement is made.
+
+ The purpose of the Next Hop field is to eliminate packets being
+ routed through extra hops in the system. It is particularly useful
+ when RIP is not being run on all of the routers on a network. A
+ simple example is given in Appendix A. Note that Next Hop is an
+ "advisory" field. That is, if the provided information is ignored, a
+ possibly sub-optimal, but absolutely valid, route may be taken.
+
+3.6 Multicasting
+
+ In order to reduce unnecessary load on those hosts which are not
+ listening to RIP-2 packets, an IP multicast address will be used for
+ periodic broadcasts. The IP multicast address is 224.0.0.9. Note
+ that IGMP is not needed since these are inter-router messages which
+ are not forwarded.
+
+ In order to maintain backwards compatibility, the use of the
+ multicast address will be configurable, as described in section 4.1.
+ If multicasting is used, it should be used on all interfaces which
+ support it.
+
+4. Compatibility
+
+ RFC 1058 showed considerable forethought in its specification of the
+ handling of version numbers. It specifies that RIP packets of
+ version 0 are to be discarded, that RIP packets of version 1 are to
+ be discarded if any Must Be Zero (MBZ) field is non-zero, and that
+ RIP packets of any version greater than 1 should not be discarded
+ simply because an MBZ field contains a value other than zero. This
+ means that the new version of RIP is totally backwards compatible
+ with existing RIP implementations which adhere to this part of the
+ specification.
+
+4.1 Compatibility Switch
+
+ A compatibility switch is necessary for two reasons. First, there
+ are implementations of RIP-1 in the field which do not follow RFC
+ 1058 as described above. Second, the use of multicasting would
+ prevent RIP-1 systems from receiving RIP-2 updates (which may be a
+ desired feature in some cases).
+
+ The switch has three settings: RIP-1, in which only RIP-1 packets are
+ sent; RIP-1 compatibility, in which RIP-2 packets are broadcast; and
+ RIP-2, in which RIP-2 packets are multicast. The recommended default
+ for this switch is RIP-1 compatibility.
+
+
+
+Malkin [Page 5]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+4.2 Authentication
+
+ Since an authentication entry is marked with an Address Family
+ Identifier of 0xFFFF, a RIP-1 system would ignore this entry since it
+ would belong to an address family other than IP. It should be noted,
+ therefore, that use of authentication will not prevent RIP-1 systems
+ from seeing RIP-2 packets. If desired, this may be done using
+ multicasting, as described in sections 3.6 and 4.1.
+
+4.3 Larger Infinity
+
+ While on the subject of compatibility, there is one item which people
+ have requested: increasing infinity. The primary reason that this
+ cannot be done is that it would violate backwards compatibility. A
+ larger infinity would obviously confuse older versions of rip. At
+ best, they would ignore the route as they would ignore a metric of
+ 16. There was also a proposal to make the Metric a single byte and
+ reuse the high three bytes, but this would break any implementations
+ which treat the metric as a long.
+
+4.4 Addressless Links
+
+ As in RIP-1, addressless links will not be supported by RIP-2.
+
+Appendix A
+
+ This is a simple example of the use of the next hop field in a rip
+ entry.
+
+ ----- ----- ----- ----- ----- -----
+ |IR1| |IR2| |IR3| |XR1| |XR2| |XR3|
+ --+-- --+-- --+-- --+-- --+-- --+--
+ | | | | | |
+ --+-------+-------+---------------+-------+-------+--
+ <-------------RIP-2------------->
+
+ Assume that IR1, IR2, and IR3 are all "internal" routers which are
+ under one administration (e.g., a campus) which has elected to use
+ RIP-2 as its IGP. XR1, XR2, and XR3, on the other hand, are under
+ separate administration (e.g., a regional network, of which the
+ campus is a member) and are using some other routing protocol (e.g.,
+ OSPF). XR1, XR2, and XR3 exchange routing information among
+ themselves such that they know that the best routes to networks N1
+ and N2 are via XR1, to N3, N4, and N5 are via XR2, and to N6 and N7
+ are via XR3. By setting the Next Hop field correctly (to XR2 for
+ N3/N4/N5, to XR3 for N6/N7), only XR1 need exchange RIP-2 routes with
+ IR1/IR2/IR3 for routing to occur without additional hops through XR1.
+ Without the Next Hop (for example, if RIP-1 were used) it would be
+
+
+
+Malkin [Page 6]
+
+RFC 1388 RIP Version 2 January 1993
+
+
+ necessary for XR2 and XR3 to also participate in the RIP-2 protocol
+ to eliminate extra hops.
+
+References
+
+ [1] Hedrick, C., "Routing Information Protocol", RFC 1058, Rutgers
+ University, June 1988.
+
+ [2] Malkin, G., and F. Baker, "RIP Version 2 MIB Extension", RFC
+ 1389, Xylogics, Inc., Advanced Computer Communications, January
+ 1993.
+
+ [3] Malkin, G., "RIP Version 2 Protocol Analysis", RFC 1387,
+ Xylogics, Inc., January 1993.
+
+Security Considerations
+
+ The basic RIP protocol is not a secure protocol. To bring RIP-2 in
+ line with more modern routing protocols, an extensible authentication
+ mechanism has been incorporated into the protocol enhancements. This
+ mechanism is described in sections 3.1 and 4.2.
+
+Author's Address
+
+ Gary Scott Malkin
+ Xylogics, Inc.
+ 53 Third Avenue
+ Burlington, MA 01803
+
+ Phone: (617) 272-8140
+ EMail: gmalkin@Xylogics.COM
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Malkin [Page 7]
+ \ No newline at end of file