summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5520.txt
blob: 041e690f882a3106db8a1e82b439ae52a147d73c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
Network Working Group                                   R. Bradford, Ed.
Request for Comments: 5520                                   JP. Vasseur
Category: Standards Track                            Cisco Systems, Inc.
                                                               A. Farrel
                                                      Old Dog Consulting
                                                              April 2009


                Preserving Topology Confidentiality in
     Inter-Domain Path Computation Using a Path-Key-Based Mechanism

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (c) 2009 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents in effect on the date of
   publication of this document (http://trustee.ietf.org/license-info).
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

Abstract

   Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS)
   Traffic Engineering (TE) Label Switched Paths (LSPs) may be computed
   by Path Computation Elements (PCEs).  Where the TE LSP crosses
   multiple domains, such as Autonomous Systems (ASes), the path may be
   computed by multiple PCEs that cooperate, with each responsible for
   computing a segment of the path.  However, in some cases (e.g., when
   ASes are administered by separate Service Providers), it would break
   confidentiality rules for a PCE to supply a path segment to a PCE in
   another domain, thus disclosing AS-internal topology information.
   This issue may be circumvented by returning a loose hop and by
   invoking a new path computation from the domain boundary Label
   Switching Router (LSR) during TE LSP setup as the signaling message
   enters the second domain, but this technique has several issues
   including the problem of maintaining path diversity.





Bradford, et al.            Standards Track                     [Page 1]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   This document defines a mechanism to hide the contents of a segment
   of a path, called the Confidential Path Segment (CPS).  The CPS may
   be replaced by a path-key that can be conveyed in the PCE
   Communication Protocol (PCEP) and signaled within in a Resource
   Reservation Protocol TE (RSVP-TE) explicit route object.

Table of contents

   1. Introduction ....................................................3
      1.1. Terminology ................................................4
   2. Path-Key Solution ...............................................5
      2.1. Mode of Operation ..........................................5
      2.2. Example ....................................................6
   3. PCEP Protocol Extensions ........................................7
      3.1. Path-Keys in PCRep Messages ................................7
           3.1.1. PKS with 32-Bit PCE ID ..............................8
           3.1.2. PKS with 128-Bit PCE ID .............................9
      3.2. Unlocking Path-Keys .......................................10
           3.2.1. Path-Key Bit .......................................10
           3.2.2. PATH-KEY Object ....................................10
           3.2.3. Path Computation Request (PCReq) Message
                  with Path-Key ......................................11
   4. PCEP Mode of Operation for Path-Key Expansion ..................12
   5. Security Considerations ........................................12
   6. Manageability Considerations ...................................13
      6.1. Control of Function through Configuration and Policy ......13
      6.2. Information and Data Models ...............................14
      6.3. Liveness Detection and Monitoring .........................15
      6.4. Verifying Correct Operation ...............................15
      6.5. Requirements on Other Protocols and Functional
           Components ................................................15
      6.6. Impact on Network Operation ...............................16
   7. IANA Considerations ............................................16
      7.1. New Subobjects for the ERO Object .........................16
      7.2. New PCEP Object ...........................................17
      7.3. New RP Object Bit Flag ....................................17
      7.4. New NO-PATH-VECTOR TLV Bit Flag ...........................17
   8. References .....................................................17
      8.1. Normative References ......................................17
      8.2. Informative References ....................................18
   Acknowledgements ..................................................19










Bradford, et al.            Standards Track                     [Page 2]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


1.  Introduction

   Path computation techniques using the Path Computation Element (PCE)
   are described in [RFC4655] and allow for path computation of inter-
   domain Multiprotocol Label Switching (MPLS) Traffic Engineering (TE)
   and Generalized MPLS (GMPLS) Label Switched Paths (LSPs).

   An important element of inter-domain TE is that TE information is not
   shared between domains for scalability and confidentiality reasons
   ([RFC4105] and [RFC4216]).  Therefore, a single PCE is unlikely to be
   able to compute a full inter-domain path.

   Two path computation scenarios can be used for inter-domain TE LSPs:
   one using per-domain path computation (defined in [RFC5152]), and the
   other using a PCE-based path computation technique with cooperation
   between PCEs (as described in [RFC4655]).  In this second case, paths
   for inter-domain LSPs can be computed by cooperation between PCEs
   each of which computes a segment of the path across one domain.  Such
   a path computation procedure is described in [RFC5441].

   If confidentiality is required between domains (such as would very
   likely be the case between Autonomous Systems (ASes) belonging to
   different Service Providers), then cooperating PCEs cannot exchange
   path segments or else the receiving PCE and the Path Computation
   Client (PCC) will be able to see the individual hops through another
   domain thus breaking the confidentiality requirement stated in
   [RFC4105] and [RFC4216].  We define the part of the path that we wish
   to keep confidential as the Confidential Path Segment (CPS).

   One mechanism for preserving the confidentiality of the CPS is for
   the PCE to return a path containing a loose hop in place of the
   segment that must be kept confidential.  The concept of loose and
   strict hops for the route of a TE LSP is described in [RFC3209].  The
   Path Computation Element Communication Protocol (PCEP) defined in
   [RFC5440] supports the use of paths with loose hops, and it is a
   local policy decision at a PCE whether it returns a full explicit
   path with strict hops or uses loose hops.  Note that a path
   computation request may request an explicit path with strict hops or
   may allow loose hops as detailed in [RFC5440].

   The option of returning a loose hop in place of the CPS can be
   achieved without further extensions to PCEP or the signaling
   protocol.  If loose hops are used, the TE LSPs are signaled as normal
   ([RFC3209]), and when a loose hop is encountered in the explicit
   route, it is resolved by performing a secondary path computation to
   reach the resource or set of resources identified by the loose hop.
   Given the nature of the cooperation between PCEs in computing the
   original path, this secondary computation occurs at or on behalf of a



Bradford, et al.            Standards Track                     [Page 3]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   Label Switching Router (LSR) at a domain boundary (i.e., an Area
   Border Router (ABR) or an AS Border Router (ASBR)) and the path is
   expanded as described in [RFC5152].

   The PCE-based computation model is particularly useful for
   determining mutually disjoint inter-domain paths such as might be
   required for service protection [RFC5298].  A single path computation
   request is used.  However, if loose hops are returned, the path of
   each TE LSP must be recomputed at the domain boundaries as the TE
   LSPs are signaled, and since the TE LSP signaling proceeds
   independently for each TE LSP, disjoint paths cannot be guaranteed
   since the LSRs in charge of expanding the explicit route objects
   (EROs) are not synchronized.  Therefore, if the loose hop technique
   is used without further extensions, path segment confidentiality and
   path diversity are mutually incompatible requirements.

   This document defines the notion of a Path-Key that is a token that
   replaces a path segment in an explicit route.  The Path-Key is
   encoded as a Path-Key Subobject (PKS) returned in the PCEP Path
   Computation Reply message (PCRep) ([RFC5440]).  Upon receiving the
   computed path, the PKS will be carried in an RSVP-TE Path message
   (RSVP-TE [RFC3209] and [RSVP-PKS]) during signaling.

   The BNF in this document follows the format described in [RBNF].

   Please note that the term "path-key" used in this document refers to
   an identifier allocated by a PCE to represent a segment of a computed
   path.  This term has no relation to the term "cryptographic key" used
   in some documents that describe security mechanisms.

1.1.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

   This document makes use of the following terminology and acronyms.

   AS: Autonomous System.

   ASBR: Autonomous System Border Routers used to connect to another AS
   of a different or the same Service Provider via one or more links
   inter-connecting between ASes.

   CPS: Confidential Path Segment.  A segment of a path that contains
   nodes and links that the AS policy requires to not be disclosed
   outside the AS.




Bradford, et al.            Standards Track                     [Page 4]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   Inter-AS TE LSP: A TE LSP that crosses an AS boundary.

   LSR: Label Switching Router.

   LSP: Label Switched Path.

   PCC: Path Computation Client: Any client application requesting a
   path computation to be performed by a Path Computation Element.

   PCE: Path Computation Element: An entity (component, application or
   network node) that is capable of computing a network path or route
   based on a network graph and applying computational constraints.

   TE LSP: Traffic Engineering Label Switched Path.

2.  Path-Key Solution

   The Path-Key solution may be applied in the PCE-based path
   computation context as follows.  A PCE computes a path segment
   related to a particular domain and replaces any CPS in the path
   reported to the requesting PCC (or another PCE) by one or more
   subobjects referred to as PKSes.  The entry boundary LSR of each CPS
   SHOULD be specified using its TE Router Id as a hop in the returned
   path immediately preceding the CPS, and other subobjects MAY be
   included in the path immediately before the hop identifying the
   boundary LSR to indicate link and label choices.  Where two PKSes are
   supplied in sequence with no intervening nodes, the entry node to the
   second CPS MAY be part of the first CPS and does not need to be
   explicitly present in the returned path.  The exit node of a CPS MAY
   be present as a strict hop immediately following the PKS.

2.1.  Mode of Operation

   During path computation, when local policy dictates that
   confidentiality must be preserved for all or part of the path segment
   being computed or if explicitly requested by the path computation
   request, the PCE associates a path-key with the computed path for the
   CPS, places its own identifier (its PCE ID as defined in Section 3.1)
   along with the path-key in a PKS, and inserts the PKS object in the
   path returned to the requesting PCC or PCE immediately after the
   subobject that identifies (using the TE Router Id) the LSR that will
   expand the PKS into explicit path hops.  This will usually be the LSR
   that is the starting point of the CPS.  The PCE that generates a PKS
   SHOULD store the computed path segment and the path-key for later
   retrieval.  A local policy SHOULD be used to determine for how long
   to retain such stored





Bradford, et al.            Standards Track                     [Page 5]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   information, and whether to discard the information after it has been
   queried using the procedures described below.  It is RECOMMENDED for
   a PCE to store the PKS for a period of 10 minutes.

   A path-key value is scoped to the PCE that computed it as identified
   by the PCE-ID carried in the PKS.  A PCE MUST NOT re-use a path-key
   value to represent a new CPS for at least 30 minutes after discarding
   the previous use of the same path-key.  A PCE that is unable to
   retain information about previously used path-key values over a
   restart SHOULD use some other mechanism to guarantee uniqueness of
   path-key values such as embedding a timestamp or version number in
   the path-key.

   A head-end LSR that is a PCC converts the path returned by a PCE into
   an explicit route object (ERO) that it includes in the Resource
   Reservation Protocol (RSVP) Path message.  If the path returned by
   the PCE contains a PKS, this is included in the ERO.  Like any other
   subobjects, the PKS is passed transparently from hop to hop, until it
   becomes the first subobject in the ERO.  This will occur at the start
   of the CPS, which will usually be the domain boundary.  The PKS MUST
   be preceded by an ERO subobject that identifies the LSR that must
   expand the PKS.  This means that (following the rules for ERO
   processing set out in [RFC3209]) the PKS will not be encountered in
   ERO processing until the ERO is being processed by the LSR that is
   capable of correctly handling the PKS.

   An LSR that encounters a PKS when trying to identify the next hop
   retrieves the PCE-ID from the PKS and sends a Path Computation
   Request (PCReq) message as defined in [RFC5440] to the PCE identified
   by the PCE-ID that contains the path-key object .

   Upon receiving the PCReq message, the PCE identifies the computed
   path segment using the supplied path-key, and returns the previously
   computed path segment in the form of explicit hops using an ERO
   object contained in the Path Computation Reply (PCRep) to the
   requesting node as defined in [RFC5440].  The requesting node inserts
   the explicit hops into the ERO and continues to process the TE LSP
   setup as per [RFC3209].

2.2.  Example

   Figure 1 shows a simple two-AS topology with a PCE responsible for
   the path computations in each AS.  An LSP is requested from the
   ingress LSR in one AS to the egress LSR in the other AS.  The
   ingress, acting as the PCC, sends a path computation request to
   PCE-1.  PCE-1 is unable to compute an end-to-end path and invokes
   PCE-2 (possibly using the techniques described in [RFC5441]).  PCE-2
   computes a path segment from ASBR-2 to the egress as {ASBR-2, C, D,



Bradford, et al.            Standards Track                     [Page 6]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   Egress}.  It could pass this path segment back to PCE-1 in full, or
   it could send back the path {ASBR-2, Egress} where the second hop is
   a loose hop.

   However, in order to protect the confidentiality of the topology in
   the second AS while still specifying the path in full, PCE-2 may send
   PCE-1 a path segment expressed as {ASBR-2, PKS, Egress} where the PKS
   is a Path-Key Subobject as defined in this document.  In this case,
   PCE-2 has identified the segment {ASBR-2, C, D, Egress} as a
   Confidential Path Segment (CPS).  PCE-1 will compute the path segment
   that it is responsible for, and will supply the full path to the PCC
   as {Ingress, A, B, ASBR-1, ASBR-2, PKS, Egress}.

   Signaling proceeds in the first AS as normal, but when the Path
   message reaches ASBR-2, the next hop is the PKS, and this must be
   expanded before signaling can progress further.  ASBR-2 uses the
   information in the PKS to request PCE-2 for a path segment, and PCE-2
   will return the segment {ASBR-2, C, D, Egress} allowing signaling to
   continue to set up the LSP.

       -----------------------------    ----------------------------
      |     -------                 |  |    -------                 |
      |    | PCE-1 |<---------------+--+-->| PCE-2 |                |
      |     -------                 |  |    -------                 |
      |      ^                      |  |    ^                       |
      |      |                      |  |    |                       |
      |      v                      |  |    v                       |
      |  -------              ----  |  |  ----                      |
      | |  PCC  |   -    -   |ASBR| |  | |ASBR|   -    -    ------  |
      | |Ingress|--|A|--|B|--|  1 |-+--+-|  2 |--|C|--|D|--|Egress| |
      |  -------    -    -    ----- |  |  ----    -    -    ------  |
      |                             |  |                            |
       -----------------------------    ----------------------------

        Figure 1 : A Simple network to demonstrate the use of the PKS

3.  PCEP Protocol Extensions

3.1.  Path-Keys in PCRep Messages

   Path-Keys are carried in PCReq and PCRep messages as part of the
   various objects that carry path definitions.  In particular, a Path-
   Key is carried in the Explicit Route Object (ERO) on PCRep messages.

   In all cases, the Path-Key is carried in a Path-Key Subobject (PKS).






Bradford, et al.            Standards Track                     [Page 7]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   The PKS is a fixed-length subobject containing a Path-Key and a
   PCE-ID.  The Path-Key is an identifier, or token used to represent
   the CPS within the context of the PCE identified by the PCE-ID.  The
   PCE-ID identifies the PCE that can decode the Path-Key using an
   identifier that is unique within the domain that the PCE serves.  The
   PCE-ID has to be mapped to a reachable IPv4 or IPv6 address of the
   PCE by the first node of the CPS (usually a domain border router) and
   a PCE MAY use one of its reachable IP addresses as its PCE-ID.
   Alternatively and to provide greater security (see Section 5) or
   increased confidentiality, according to domain-local policy, the PCE
   MAY use some other identifier that is scoped only within the domain.

   To allow IPv4 and IPv6 addresses to be carried, two subobjects are
   defined in the following subsections.

   The Path-Key Subobject may be present in the PCEP ERO or the PCEP
   PATH-KEY object (see Section 3.2).

3.1.1.  PKS with 32-Bit PCE ID

   The Subobject Type for the PKS with 32-bit PCE ID is 64.  The format
   of this subobject is as follows:

     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |L|    Type     |     Length    |           Path-Key            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                         PCE ID (4 bytes)                      |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      L

         The L bit SHOULD NOT be set, so that the subobject represents a
         strict hop in the explicit route.

      Type

         Subobject Type for a Path-Key with 32-bit PCE ID (64).

      Length

         The Length contains the total length of the subobject in bytes,
         including the Type and Length fields.  The Length is always 8.







Bradford, et al.            Standards Track                     [Page 8]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


      PCE ID

         A 32-bit identifier of the PCE that can decode this path-key.
         The identifier MUST be unique within the scope of the domain
         that the CPS crosses, and MUST be understood by the LSR that
         will act as PCC for the expansion of the PKS.  The
         interpretation of the PCE-ID is subject to domain-local policy.
         It MAY be an IPv4 address of the PCE that is always reachable,
         and MAY be an address that is restricted to the domain in which
         the LSR that is called upon to expand the CPS lies.  Other
         values that have no meaning outside the domain (for example,
         the Router ID of the PCE) MAY be used to increase security or
         confidentiality (see Section 5).

3.1.2.  PKS with 128-Bit PCE ID

   The Subobject Type for the PKS with 128-bit PCE ID is 65.  The format
   of the subobject is as follows.

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |L|    Type     |     Length    |           Path-Key            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        PCE ID (16 bytes)                      |
   |                                                               |
   |                                                               |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

      L

         As above.

      Type

         Subobject Type for a Path-Key with 128-bit PCE ID (65).

      Length

         The Length contains the total length of the subobject in bytes,
         including the Type and Length fields.  The Length is always 20.

      PCE ID

         A 128-bit identifier of the PCE that can decode this path-key.
         The identifier MUST be unique within the scope of the domain
         that the CPS crosses, and MUST be understood by the LSR that



Bradford, et al.            Standards Track                     [Page 9]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


         will act as PCC for the expansion of the PKS.  The
         interpretation of the PCE-ID is subject to domain-local policy.
         It MAY be an IPv6 address of the PCE that is always reachable,
         but MAY be an address that is restricted to the domain in which
         the LSR that is called upon to expand the CPS lies.  Other
         values that have no meaning outside the domain (for example,
         the IPv6 TE Router ID) MAY be used to increase security (see
         Section 5).

3.2.  Unlocking Path-Keys

   When a network node needs to decode a Path-Key so that it can
   continue signaling for an LSP, it must send a PCReq to the designated
   PCE.  The PCReq defined in [RFC5440] needs to be modified to support
   this usage, which differs from the normal path computation request.
   To that end, a new flag is defined to show that the PCReq relates to
   the expansion of a PKS, and a new object is defined to carry the PKS
   in the PCReq.  These result in an update to the BNF for the message.
   The BNF used in this document is as described in [RBNF].

3.2.1.  Path-Key Bit

   [RFC5440] defines the Request Parameters (RP) object that is used to
   specify various characteristics of the Path Computation Request
   (PCReq).

   In this document, we define a new bit named the Path-Key bit as
   follows.  See Section 7.3 for the IANA assignment of the appropriate
   bit number.

   Path-Key bit: When set, the requesting PCC requires the retrieval of
   a Confidential Path Segment that corresponds to the PKS carried in a
   PATH-KEY object in the path computation request.  The Path-Key bit
   MUST be cleared when the path computation request is not related to a
   CPS retrieval.

3.2.2.  PATH-KEY Object

   When a PCC needs to expand a path-key in order to expand a CPS, it
   issues a Path Computation Request (PCReq) to the PCE identified in
   the PKS in the RSVP-TE ERO that it is processing.  The PCC supplies
   the PKS to be expanded in a PATH-KEY Object in the PCReq message.









Bradford, et al.            Standards Track                    [Page 10]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   The PATH-KEY Object is defined as follows:

   PATH-KEY Object-Class is 16.

   Path-Key Object-Type is 1.

   The PATH-KEY Object MUST contain at least one Path-Key Subobject (see
   Section 3.1).  The first PKS MUST be processed by the PCE.
   Subsequent subobjects SHOULD be ignored.

3.2.3.  Path Computation Request (PCReq) Message with Path-Key

   The format of a PCReq message including a PATH-KEY object is
   unchanged as follows:

       <PCReq Message>::= <Common Header>
                          [<SVEC-list>]
                          <request-list>

       where:
          <svec-list>::=<SVEC>[<svec-list>]
          <request-list>::=<request>[<request-list>]

   To support the use of the message to expand a PKS, the definition of
   <request> is modified as follows :

       <request>::= <RP>
                    <segment-computation> | <path-key-expansion>

       where:
          <segment-computation> ::= <END-POINTS>
                                    [<LSPA>]
                                    [<BANDWIDTH>]
                                    [<BANDWIDTH>]
                                    [<metric-list>]
                                    [<RRO>]
                                    [<IRO>]
                                    [<LOAD-BALANCING>]
          <path-key-expansion> ::= <PATH-KEY>

   Thus, the format of the message for use in normal path computation is
   unmodified.









Bradford, et al.            Standards Track                    [Page 11]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


4.  PCEP Mode of Operation for Path-Key Expansion

   The retrieval of the explicit path (the CPS) associated with a PKS by
   a PCC is no different than any other path computation request with
   the exception that the PCReq message MUST contain a PATH-KEY object
   and the Path-Key bit of the RP object MUST be set.  On receipt of a
   PCRep containing a CPS, the requesting PCC SHOULD insert the CPS into
   the ERO that it will signal, in accordance with local policy.

   If the receiving PCE does not recognize itself as identified by the
   PCE ID carried in the PKS, it MAY forward the PCReq message to
   another PCE according to local policy.  If the PCE does not forward
   such a PCReq, it MUST respond with a PCRep message containing a
   NO-PATH object.

   If the receiving PCE recognizes itself, but cannot find the related
   CPS, or if the retrieval of the CPS is not allowed by policy, the PCE
   MUST send a PCRep message that contains a NO-PATH object.  The
   NO-PATH-VECTOR TLV SHOULD be used as described in [RFC5440] and a new
   bit number (see Section 7.4) is assigned to indicate "Cannot expand
   PKS".

   Upon receipt of a negative reply, the requesting LSR MUST fail the
   LSP setup and SHOULD use the procedures associated with loose hop
   expansion failure [RFC3209].

5.  Security Considerations

   This document describes tunneling confidential path information
   across an untrusted domain (such as an AS).  There are many security
   considerations that apply to PCEP and RSVP-TE.

   Issues include:

   - Confidentiality of the CPS (can other network elements probe for
     expansion of path-keys, possibly at random?).

   - Authenticity of the path-key (resilience to alteration by
     intermediaries, resilience to fake expansion of path-keys).

   - Resilience from Denial-of-Service (DoS) attacks (insertion of
     spurious path-keys; flooding of bogus path-key expansion requests).

   Most of the interactions required by this extension are point to
   point, can be authenticated and made secure as described in [RFC5440]
   and [RFC3209].  These interactions include the:





Bradford, et al.            Standards Track                    [Page 12]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


       - PCC->PCE request

       - PCE->PCE request(s)

       - PCE->PCE response(s)

       - PCE->PCC response

       - LSR->LSR request and response.  Note that a rogue LSR could
         modify the ERO and insert or modify Path-Keys.  This would
         result in an LSR (which is downstream in the ERO) sending
         decode requests to a PCE.  This is actually a larger problem
         with RSVP.  The rogue LSR is an existing issue with RSVP and
         will not be addressed here.

       - LSR->PCE request.  Note that the PCE can check that the LSR
         requesting the decode is the LSR at the head of the Path-Key.
         This largely contains the previous problem of DoS rather than a
         security issue.  A rogue LSR can issue random decode requests,
         but these will amount only to DoS.

       - PCE->LSR response

   Thus, the major security issues can be dealt with using standard
   techniques for securing and authenticating point-to-point
   communications.  In addition, it is recommended that the PCE
   providing a decode response should check that the LSR that issued the
   decode request is the head end of the decoded ERO segment.

   Further protection can be provided by using a PCE ID to identify the
   decoding PCE that is only meaningful within the domain that contains
   the LSR at the head of the CPS.  This may be an IP address that is
   only reachable from within the domain, or some not-address value.
   The former requires configuration of policy on the PCEs, the latter
   requires domain-wide policy.

6.  Manageability Considerations

6.1.  Control of Function through Configuration and Policy

   The treatment of a path segment as a CPS, and its substitution in a
   PCRep ERO with a PKS, is a function that MUST be under operator and
   policy control where a PCE supports the function.  The operator MUST
   be given the ability to specify which path segments are to be
   replaced and under what circumstances.  For example, an operator
   might set a policy that states that every path segment for the
   operator's domain will be replaced by a PKS when the PCReq has been
   issued from outside the domain.



Bradford, et al.            Standards Track                    [Page 13]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   The operation of the PKS extensions require that path-keys are
   retained by the issuing PCE to be available for retrieval by an LSR
   (acting as a PCC) at a later date.  But it is possible that the
   retrieval request will never be made, so good housekeeping requires
   that a timer is run to discard unwanted path-keys.  A default value
   for this timer is suggested in Section 2.1.  Implementations SHOULD
   provide the ability for this value to be overridden through operator
   configuration or policy.

   After a PKS has been expanded in response to a retrieval request, it
   may be valuable to retain the path-key and CPS for debugging
   purposes.  Such retention SHOULD NOT be the default behavior of an
   implementation, but MAY be available in response to operator request.

   Once a path-key has been discarded, the path-key value SHOULD NOT be
   immediately available for re-use for a new CPS since this might lead
   to accidental misuse.  A default timer value is suggested in Section
   2.1.  Implementations SHOULD provide the ability for this value to be
   overridden through operator configuration or policy.

   A PCE must set a PCE-ID value in each PKS it creates so that PCCs can
   correctly identify it and send PCReq messages to expand the PKS to a
   path segment.  A PCE implementation SHOULD allow operator or policy
   control of the value to be used as the PCE-ID.  If the PCE allows
   PCE-ID values that are not routable addresses to be used, the PCCs
   MUST be configurable (by the operator or through policy) to allow the
   PCCs to map from the PCE-ID to a routable address of the PCE.  Such
   mapping may be algorithmic, procedural (for example, mapping a PCE-ID
   equal to the IGP Router ID into a routable address), or configured
   through a local or remote mapping table.

6.2.  Information and Data Models

   A MIB module for PCEP is already defined in [PCEP-MIB].  The
   configurable items listed in Section 6.1 MUST be added as readable
   objects in the module and SHOULD be added as writable objects.

   A new MIB module MUST be created to allow inspection of path-keys.
   For a given PCE, this MIB module MUST provide a mapping from path-
   key to path segment (that is, a list of hops), and MUST supply other
   information including:

   - The identity of the PCC that issued the original request that led
     to the creation of the path-key.

   - The request ID of the original PCReq.





Bradford, et al.            Standards Track                    [Page 14]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


   - Whether the path-key has been retrieved yet, and if so, by which
     PCC.

   - How long until the path segment associated with the path-key will
     be discarded.

   - How long until the path-key will be available for re-use.

6.3.  Liveness Detection and Monitoring

   The procedures in this document extend PCEP, but do not introduce new
   interactions between network entities.  Thus, no new liveness
   detection or monitoring is required.

   It is possible that a head-end LSR that has be given a path including
   PKSs replacing specific CPSs will want to know whether the path-keys
   are still valid (or have timed out).  However, rather than introduce
   a mechanism to poll the PCE that is responsible for the PKS, it is
   considered pragmatic to simply signal the associated LSP.

6.4.  Verifying Correct Operation

   The procedures in this document extend PCEP, but do not introduce new
   interactions between network entities.  Thus, no new tools for
   verifying correct operation are required.

   A PCE SHOULD maintain counters and logs of the following events that
   might indicate incorrect operation (or might indicate security
   issues).

   - Attempts to expand an unknown path-key.

   - Attempts to expand an expired path-key.

   - Duplicate attempts to expand the same path-key.

   - Expiry of path-key without attempt to expand it.

6.5.  Requirements on Other Protocols and Functional Components

   The procedures described in this document require that the LSRs
   signal PKSs as defined in [RSVP-PKS].  Note that the only changes to
   LSRs are at the PCCs.  Specifically, changes are only needed at the
   head-end LSRs that build RSVP-TE Path messages containing Path-Key
   Subobjects in their EROs, and the LSRs that discover such subobjects
   as next hops and must expand them.  Other LSRs in the network, even
   if they are on the path of the LSP, will not be called upon to
   process the PKS.



Bradford, et al.            Standards Track                    [Page 15]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


6.6.  Impact on Network Operation

   As well as the security and confidentiality aspects addressed by the
   use of the PKS, there may be some scaling benefits associated with
   the procedures described in this document.  For example, a single PKS
   in an explicit route may substitute for many subobjects and can
   reduce the overall message size correspondingly.  In some
   circumstances, such as when the explicit route contains multiple
   subobjects for each hop (including node IDs, TE link IDs, component
   link IDs for each direction of a bidirectional LSP, and label IDs for
   each direction of a bidirectional LSP) or when the LSP is a point-
   to-multipoint LSP, this scaling improvement may be very significant.

   Note that a PCE will not supply a PKS unless it knows that the LSR
   that will receive the PKS through signaling will be able to handle
   it.  Furthermore, as noted in Section 6.5, only those LSRs
   specifically called upon to expand the PKS will be required to
   process the subobjects during signaling.  Thus, the only backward
   compatibility issues associated with the procedures introduced in
   this document arise when a head-end LSR receives a PCRep with an ERO
   containing a PKS, and it does not know how to encode this into
   signaling.

   Since the PCE that inserted the PKS is required to keep the CPS
   confidential, the legacy head-end LSR cannot be protected.  It must
   either fail the LSP setup, or request a new path computation avoiding
   the domain that has supplied it with unknown subobjects.

7.  IANA Considerations

   IANA assigns values to PCEP parameters in registries defined in
   [RFC5440].  IANA has made the following additional assignments.

7.1.  New Subobjects for the ERO Object

   IANA has previously assigned an Object-Class and Object-Type to the
   ERO carried in PCEP messages [RFC5440].  IANA also maintains a list
   of subobject types valid for inclusion in the ERO.

   IANA assigned two new subobject types for inclusion in the ERO as
   follows:

   Subobject Type                                         Reference
             64   Path-Key with 32-bit PCE ID             [RFC5520]
             65   Path-Key with 128-bit PCE ID            [RFC5520]






Bradford, et al.            Standards Track                    [Page 16]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


7.2.  New PCEP Object

   IANA assigned a new object class in the registry of PCEP Objects as
   follows.

   Object  Name          Object  Name                     Reference
   Class                 Type

   16    PATH-KEY        1       Path-Key                 [RFC5520]

       Subobjects
          This object may carry the following subobjects as defined
          for the ERO object.

                  64   Path-Key with 32-bit PCE ID        [RFC5520]
                  65   Path-Key with 128-bit PCE ID       [RFC5520]

7.3.  New RP Object Bit Flag

   IANA maintains a registry of bit flags carried in the PCEP RP object
   as defined in [RFC5440].  IANA assigned a new bit flag as follows:

   Bit Number  Hex       Name                             Reference
   23          0x000017  Path-Key (P-bit)                 [RFC5520]

7.4.  New NO-PATH-VECTOR TLV Bit Flag

   IANA maintains a registry of bit flags carried in the PCEP NO-PATH-
   VECTOR TLV in the PCEP NO-PATH object as defined in [RFC5440].  IANA
   assigned a new bit flag as follows:

   Bit Number      Name Flag                    Reference
   27              PKS expansion failure        [RFC5520]

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC5440]  Vasseur, JP., Ed., and JL. Le Roux, Ed., "Path Computation
              Element (PCE) Communication Protocol (PCEP)", RFC 5440,
              March 2009.







Bradford, et al.            Standards Track                    [Page 17]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


8.2.  Informative References

   [PCEP-MIB] Koushik, K., and E. Stephan, "PCE Communication Protocol
              (PCEP) Management Information Base", Work in Progress,
              November 2008.

   [RBNF]     Farrel, A., "Reduced Backus-Naur Form (RBNF) A Syntax Used
              in Various Protocol Specifications", Work in Progress,
              November 2008.

   [RFC3209]  Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
              and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
              Tunnels", RFC 3209, December 2001.

   [RFC4105]  Le Roux, J.-L., Ed., Vasseur, J.-P., Ed., and J. Boyle,
              Ed., "Requirements for Inter-Area MPLS Traffic
              Engineering", RFC 4105, June 2005.

   [RFC4216]  Zhang, R., Ed., and J.-P. Vasseur, Ed., "MPLS Inter-
              Autonomous System (AS) Traffic Engineering (TE)
              Requirements", RFC 4216, November 2005.

   [RFC4655]  Farrel, A., Vasseur, J.-P., and J. Ash, "A Path
              Computation Element (PCE)-Based Architecture", RFC 4655,
              August 2006.

   [RFC5152]  Vasseur, JP., Ed., Ayyangar, A., Ed., and R. Zhang, "A
              Per-Domain Path Computation Method for Establishing
              Inter-Domain Traffic Engineering (TE) Label Switched Paths
              (LSPs)", RFC 5152, February 2008.

   [RFC5298]  Takeda, T., Ed., Farrel, A., Ed., Ikejiri, Y., and JP.
              Vasseur, "Analysis of Inter-Domain Label Switched Path
              (LSP) Recovery", RFC 5298, August 2008.

   [RFC5441]  Vasseur, JP., Ed., Zhang, R., Bitar, N., and JL. Le Roux,
              "A Backward-Recursive PCE-Based Computation (BRPC)
              Procedure to Compute Shortest Constrained Inter-Domain
              Traffic Engineering Label Switched Paths", RFC 5441, April
              2009.

   [RSVP-PKS] Bradford, R., Vasseur, JP., and A. Farrel, "RSVP
              Extensions for Path Key Support", Work in Progress,
              February 2008.







Bradford, et al.            Standards Track                    [Page 18]
^L
RFC 5520          Preserving Topology Confidentiality         April 2009


Acknowledgements

   The authors would like to thank Eiji Oki, Ben Campbell, and Ross
   Callon for their comments on this document.

Authors' Addresses

   Rich Bradford (Editor)
   Cisco Systems, Inc.
   1414 Massachusetts Avenue
   Boxborough, MA 01719
   USA
   EMail: rbradfor@cisco.com

   JP. Vasseur
   Cisco Systems, Inc.
   1414 Massachusetts Avenue
   Boxborough, MA 01719
   USA
   EMail: jpv@cisco.com

   Adrian Farrel
   Old Dog Consulting
   EMail: adrian@olddog.co.uk



























Bradford, et al.            Standards Track                    [Page 19]
^L