summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4971.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc4971.txt')
-rw-r--r--doc/rfc/rfc4971.txt507
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc4971.txt b/doc/rfc/rfc4971.txt
new file mode 100644
index 0000000..c8564a7
--- /dev/null
+++ b/doc/rfc/rfc4971.txt
@@ -0,0 +1,507 @@
+
+
+
+
+
+
+Network Working Group JP. Vasseur, Ed.
+Request for Comments: 4971 N. Shen, Ed.
+Category: Standards Track Cisco Systems, Inc.
+ R. Aggarwal, Ed.
+ Juniper Networks
+ July 2007
+
+
+ Intermediate System to Intermediate System (IS-IS) Extensions
+ for Advertising Router Information
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The IETF Trust (2007).
+
+Abstract
+
+ This document defines a new optional Intermediate System to
+ Intermediate System (IS-IS) TLV named CAPABILITY, formed of multiple
+ sub-TLVs, which allows a router to announce its capabilities within
+ an IS-IS level or the entire routing domain.
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Conventions Used in This Document ..........................2
+ 2. IS-IS Router CAPABILITY TLV .....................................3
+ 3. Elements of Procedure ...........................................4
+ 4. Interoperability with Routers Not Supporting the
+ Capability TLV ..................................................5
+ 5. Security Considerations .........................................6
+ 6. IANA Considerations .............................................6
+ 7. Acknowledgment ..................................................6
+ 8. References ......................................................6
+ 8.1. Normative References .......................................6
+ 8.2. Informative References .....................................8
+
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 1]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+1. Introduction
+
+ There are several situations where it is useful for the IS-IS [IS-IS]
+ [IS-IS-IP] routers to learn the capabilities of the other routers of
+ their IS-IS level, area, or routing domain. For the sake of
+ illustration, three examples related to MPLS Traffic Engineering (TE)
+ are described here:
+
+ 1. Mesh-group: the setting up of a mesh of TE Label Switched Paths
+ (LSPs) [IS-IS-TE] requires some significant configuration effort.
+ [AUTOMESH] proposes an auto-discovery mechanism whereby every
+ Label Switching Router (LSR) of a mesh advertises its mesh-group
+ membership by means of IS-IS extensions.
+
+ 2. Point to Multipoint TE LSP (P2MP LSP). A specific sub-TLV
+ ([TE-NODE-CAP]) allows an LSR to advertise its Point To Multipoint
+ capabilities ([P2MP] and [P2MP-REQS]).
+
+ 3. Inter-area traffic engineering: Advertisement of the IPv4 and/or
+ the IPv6 Traffic Engineering Router IDs.
+
+ The use of IS-IS for Path Computation Element (PCE) discovery may
+ also be considered and will be discussed in the PCE WG.
+
+ The capabilities mentioned above require the specification of new
+ sub-TLVs carried within the CAPABILITY TLV defined in this document.
+
+ Note that the examples above are provided for the sake of
+ illustration. This document proposes a generic capability
+ advertising mechanism that is not limited to MPLS Traffic
+ Engineering.
+
+ This document defines a new optional IS-IS TLV named CAPABILITY,
+ formed of multiple sub-TLVs, which allows a router to announce its
+ capabilities within an IS-IS level or the entire routing domain. The
+ applications mentioned above require the specification of new sub-
+ TLVs carried within the CAPABILITY TLV defined in this document.
+
+ Definition of these sub-TLVs is outside the scope of this document.
+
+1.1. Conventions Used in This Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [RFC-2119].
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 2]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+2. IS-IS Router CAPABILITY TLV
+
+ The IS-IS Router CAPABILITY TLV is composed of 1 octet for the type,
+ 1 octet that specifies the number of bytes in the value field, and a
+ variable length value field that starts with 4 octets of Router ID,
+ indicating the source of the TLV, and followed by 1 octet of flags.
+
+ A set of optional sub-TLVs may follow the flag field. Sub-TLVs are
+ formatted as described in RFC 3784 [IS-IS-TE].
+
+ TYPE: 242
+ LENGTH: from 5 to 255
+ VALUE:
+ Router ID (4 octets)
+ Flags (1 octet)
+ Set of optional sub-TLVs (0-250 octets)
+
+ Flags
+
+ 0 1 2 3 4 5 6 7
+ +-+-+-+-+-+-+-+-+
+ | Reserved |D|S|
+ +-+-+-+-+-+-+-+-+
+
+ Currently two bit flags are defined.
+
+ S bit (0x01): If the S bit is set(1), the IS-IS Router CAPABILITY TLV
+ MUST be flooded across the entire routing domain. If the S bit is
+ not set(0), the TLV MUST NOT be leaked between levels. This bit MUST
+ NOT be altered during the TLV leaking.
+
+ D bit (0x02): When the IS-IS Router CAPABILITY TLV is leaked from
+ level-2 to level-1, the D bit MUST be set. Otherwise, this bit MUST
+ be clear. IS-IS Router capability TLVs with the D bit set MUST NOT
+ be leaked from level-1 to level-2. This is to prevent TLV looping.
+
+ The Router CAPABILITY TLV is OPTIONAL. As specified in Section 3,
+ more than one Router CAPABILITY TLV from the same source MAY be
+ present.
+
+ This document does not specify how an application may use the Router
+ Capability TLV and such specification is outside the scope of this
+ document.
+
+
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 3]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+3. Elements of Procedure
+
+ A router that generates a CAPABILITY TLV MUST have a Router ID that
+ is a 32-bit number. The ID MUST be unique within the IS-IS area. If
+ the router generates any capability TLVs with domain flooding scope,
+ then the ID MUST also be unique within the IS-IS routing domain.
+
+ When advertising capabilities with different flooding scopes, a
+ router MUST originate a minimum of two Router CAPABILITY TLVs, each
+ TLV carrying the set of sub-TLVs with the same flooding scope. For
+ instance, if a router advertises two sets of capabilities, C1 and C2,
+ with an area/level scope and routing domain scope respectively, C1
+ and C2 being specified by their respective sub-TLV(s), the router
+ will originate two Router CAPABILITY TLVs:
+
+ - One Router CAPABILITY TLV with the S flag cleared, carrying the
+ sub-TLV(s) relative to C1. This Router CAPABILITY TLV will not be
+ leaked into another level.
+
+ - One Router CAPABILITY TLV with the S flag set, carrying the sub-
+ TLV(s) relative to C2. This Router CAPABILITY TLV will be leaked
+ into other IS-IS levels. When the TLV is leaked from level-2 to
+ level-1, the D bit will be set in the level-1 LSP advertisement.
+
+ In order to prevent the use of stale capabilities, a system MUST NOT
+ use a Capability TLV present in an LSP of a system that is not
+ currently reachable via Level-x paths, where "x" is the level (1 or
+ 2) in which the sending system advertised the TLV. This requirement
+ applies regardless of whether or not the sending system is the
+ originator of the Capabilities TLV. Note that leaking a Capabilities
+ TLV is one of the uses that is prohibited under these conditions.
+
+ Example: If Level-1 router A generates a Capability TLV and floods
+ it to two L1/L2 routers, S and T, they will flood it into the
+ Level-2 domain. Now suppose the Level-1 area partitions, such
+ that A and S are in one partition and T is in another. IP routing
+ will still continue to work, but if A now issues a revised version
+ of the CAP TLV, or decides to stop advertising it, S will follow
+ suit, but T will continue to advertise the old version until the
+ LSP times out.
+
+ Routers in other areas have to choose whether to trust T's copy of
+ A's capabilities or S's copy of A's information and, they have no
+ reliable way to choose. By making sure that T stops leaking A's
+ information, this removes the possibility that other routers will use
+ stale information from A.
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 4]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+ In IS-IS, the atomic unit of the update process is a TLV -- or more
+ precisely, in the case of TLVs that allow multiple entries to appear
+ in the value field (e.g., IS-neighbors), the atomic unit is an entry
+ in the value field of a TLV. If an update to an entry in a TLV is
+ advertised in an LSP fragment different from the LSP fragment
+ associated with the old advertisement, the possibility exists that
+ other systems can temporarily have either 0 copies of a particular
+ advertisement or 2 copies of a particular advertisement, depending on
+ the order in which new copies of the LSP fragment that had the old
+ advertisement and the fragment that has the new advertisement arrive
+ at other systems.
+
+ Wherever possible, an implementation SHOULD advertise the update to a
+ capabilities TLV in the same LSP fragment as the advertisement that
+ it replaces. Where this is not possible, the two affected LSP
+ fragments should be flooded as an atomic action.
+
+ Systems that receive an update to an existing capability TLV can
+ minimize the potential disruption associated with the update by
+ employing a holddown time prior to processing the update so as to
+ allow for the receipt of multiple LSP fragments associated with the
+ same update prior to beginning processing.
+
+ Where a receiving system has two copies of a capabilities TLV from
+ the same system that have different settings for a given attribute,
+ the procedure used to choose which copy shall be used is undefined.
+
+4. Interoperability with Routers Not Supporting the Capability TLV
+
+ Routers that do not support the Router CAPABILITY TLV MUST silently
+ ignore the TLV(s) and continue processing other TLVs in the same LSP.
+ Routers that do not support specific sub-TLVs carried within a Router
+ CAPABILITY TLV MUST silently ignore the unsupported sub-TLVs and
+ continue processing those sub-TLVs that are supported in the Router
+ CAPABILITY TLV. How partial support may impact the operation of the
+ capabilities advertised within the Router CAPABILITY TLV is outside
+ the scope of this document.
+
+ In order for Router CAPABILITY TLVs with domain-wide scope originated
+ by L1 Routers to be flooded across the entire domain, at least one
+ L1/L2 Router in every area of the domain MUST support the Router
+ CAPABILITY TLV.
+
+
+ If leaking of the CAPABILITY TLV is required, the entire CAPABILITY
+ TLV MUST be leaked into another level even though it may contain some
+ of the unsupported sub-TLVs.
+
+
+
+
+Vasseur, et al. Standards Track [Page 5]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+5. Security Considerations
+
+ Any new security issues raised by the procedures in this document
+ depend upon the opportunity for LSPs to be snooped and modified, the
+ ease/difficulty of which has not been altered. As the LSPs may now
+ contain additional information regarding router capabilities, this
+ new information would also become available to an attacker.
+ Specifications based on this mechanism need to describe the security
+ considerations around the disclosure and modification of their
+ information. Note that an integrity mechanism, such as the one
+ defined in [RFC-3567] or [IS-IS-HMAC], should be applied if there is
+ high risk resulting from modification of capability information.
+
+6. IANA Considerations
+
+ IANA assigned a new IS-IS TLV code-point for the newly defined IS-IS
+ TLV type named the IS-IS Router CAPABILITY TLV and defined in this
+ document. The assigned value is 242.
+
+7. Acknowledgment
+
+ The authors would like to thank Jean-Louis Le Roux, Paul Mabey,
+ Andrew Partan, and Adrian Farrel for their useful comments.
+
+8. References
+
+8.1. Normative References
+
+ [RFC-2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [IS-IS] "Intermediate System to Intermediate System Intra-
+ Domain Routeing Exchange Protocol for use in
+ Conjunction with the Protocol for Providing the
+ Connectionless-mode Network Service (ISO 8473)", ISO
+ 10589.
+
+ [RFC-3567] Li, T. and R. Atkinson, "Intermediate System to
+ Intermediate System (IS-IS) Cryptographic
+ Authentication", RFC 3567, July 2003.
+
+ [IS-IS-IP] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
+ dual environments", RFC 1195, December 1990.
+
+ [IS-IS-TE] Smit, H. and T. Li, "Intermediate System to
+ Intermediate System (IS-IS) Extensions for Traffic
+ Engineering (TE)", RFC 3784, June 2004.
+
+
+
+
+Vasseur, et al. Standards Track [Page 6]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+8.2. Informative References
+
+ [AUTOMESH] Vasseur, JP., Ed., Le Roux, JL., Ed., Yasukawa, S.,
+ Previdi, S., Psenak, P., and P. Mabbey, "Routing
+ extensions for Discovery of Multiprotocol (MPLS) Label
+ Switch Router (LSR) Traffic Engineering (TE) Mesh
+ Membership", RFC 4972, July 2007.
+
+ [TE-NODE-CAP] Vasseur, JP., Ed., and J.L. Le Roux, "Routing
+ Extensions for Discovery of Traffic Engineering Node
+ Capabilities", Work in Progress, April 2007.
+
+ [P2MP] Aggarwal, R., Ed., Papadimitriou, D., Ed., and S.
+ Yasukawa, Ed., "Extensions to Resource Reservation
+ Protocol - Traffic Engineering (RSVP-TE) for Point-to-
+ Multipoint TE Label Switched Paths (LSPs)", RFC 4875,
+ May 2007.
+
+ [P2MP-REQS] Yasukawa, S., Ed., "Signaling Requirements for Point-
+ to-Multipoint Traffic-Engineered MPLS Label Switched
+ Paths (LSPs)", RFC 4461, April 2006.
+
+ [IS-IS-HMAC] Bhatia, M., Ed. and V. Manral, Ed., "IS-IS Generic
+ Cryptographic Authentication", Work in Progress, May
+ 2007.
+
+Authors' Addresses
+
+ Jean-Philippe Vasseur
+ CISCO Systems, Inc.
+ 1414 Massachusetts Avenue
+ Boxborough, MA 01719
+ USA
+ EMail: jpv@cisco.com
+
+ Stefano Previdi
+ CISCO Systems, Inc.
+ Via Del Serafico 200
+ 00142 - Roma
+ ITALY
+ EMail: sprevidi@cisco.com
+
+
+
+
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 7]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+ Mike Shand
+ Cisco Systems
+ 250 Longwater Avenue,
+ Reading,
+ Berkshire,
+ RG2 6GB
+ UK
+ EMail: mshand@cisco.com
+
+ Les Ginsberg
+ Cisco Systems
+ 510 McCarthy Blvd.
+ Milpitas, Ca. 95035 USA
+ EMail: ginsberg@cisco.com
+
+ Acee Lindem
+ Redback Networks
+ 102 Carric Bend Court
+ Cary, NC 27519
+ USA
+ EMail: acee@redback.com
+
+ Naiming Shen
+ Cisco Systems
+ 225 West Tasman Drive
+ San Jose, CA 95134
+ USA
+ EMail: naiming@cisco.com
+
+ Rahul Aggarwal
+ Juniper Networks
+ 1194 N. Mathilda Avenue
+ San Jose, CA 94089
+ USA
+ EMail: rahul@juniper.net
+
+ Scott Shaffer
+ EMail: sshaffer@bridgeport-networks.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 8]
+
+RFC 4971 IS-IS Extensions for Advertising Router Info July 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Vasseur, et al. Standards Track [Page 9]
+