1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
|
Internet Engineering Task Force (IETF) A. Lindem
Request for Comments: 6549 Ericsson
Updates: 2328 A. Roy
Category: Standards Track S. Mirtorabi
ISSN: 2070-1721 Cisco Systems
March 2012
OSPFv2 Multi-Instance Extensions
Abstract
OSPFv3 includes a mechanism to support multiple instances of the
protocol running on the same interface. OSPFv2 can utilize such a
mechanism in order to support multiple routing domains on the same
subnet.
This document defines the OSPFv2 Instance ID to enable separate
OSPFv2 protocol instances on the same interface. Unlike OSPFv3 where
the Instance ID can be used for multiple purposes, such as putting
the same interface in multiple areas, the OSPFv2 Instance ID is
reserved for identifying protocol instances.
This document updates RFC 2328.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by
the Internet Engineering Steering Group (IESG). Further
information on Internet Standards is available in Section 2 of
RFC 5741.
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6549.
Lindem, et al. Standards Track [Page 1]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction ....................................................2
1.1. Requirements Notation ......................................3
2. OSPFv2 Instance Packet Encoding .................................3
3. OSPFv2 Interface Instance ID ....................................4
3.1. Sending and Receiving OSPFv2 Packets .......................4
3.2. Interface Instance ID Values ...............................4
4. State Sharing Optimizations between OSPFv2 Instances ............5
5. OSPFv2 Authentication Impacts ...................................5
6. Backward Compatibility and Deployment Considerations ............5
7. Security Considerations .........................................6
8. IANA Considerations .............................................6
9. References ......................................................7
9.1. Normative References .......................................7
9.2. Informative References .....................................7
Appendix A. Acknowledgments.... ....................................8
1. Introduction
OSPFv3 [OSPFV3] includes a mechanism to support multiple instances of
a protocol running on the same interface. OSPFv2 [OSPFV2] can
utilize such a mechanism in order to support multiple routing domains
on the same subnet.
This document defines the OSPFv2 Instance ID to enable separate
OSPFv2 protocol instances on the same interface. Unlike OSPFv3 where
the Instance ID can be used for multiple purposes, such as putting
the same interface in multiple areas, the OSPFv2 Instance ID is
reserved for identifying protocol instances.
Lindem, et al. Standards Track [Page 2]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
1.1. Requirements Notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC-KEYWORDS].
2. OSPFv2 Instance Packet Encoding
This document extends OSPFv2 with a mechanism to differentiate
packets for different instances sent and received on the same
interface. In support of this capability, a modified packet header
format with the Authentication Type field split into an Instance ID
and AuType.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Version # | Type | Packet length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Router ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Area ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum | Instance ID | AuType |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Authentication |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The OSPFv2 Packet Header
All fields are as defined in [OSPFV2] except that the Instance ID
field is new, and the AuType field is reduced to 8 bits from 16 bits
without any change in meaning. The Instance ID field is defined as
follows:
Instance ID
Enables multiple instances of OSPFv2 to be used on a single
interface. Each protocol instance would be assigned a separate
Instance ID; the Instance ID has local subnet significance only.
Received packets with an Instance ID not equal to one of the
Instance IDs corresponding to one of the configured OSPFv2
Instances for the receiving interface MUST be discarded.
Lindem, et al. Standards Track [Page 3]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
3. OSPFv2 Interface Instance ID
Section 9 of [OSPFV2] describes the conceptual interface data
structure. The OSPFv2 Interface Instance ID is added to this
structure. The OSPFv2 Interface Instance ID has a default value of
0. Setting it to a non-zero value may be accomplished through
configuration.
3.1. Sending and Receiving OSPFv2 Packets
When sending OSPFv2 packets, the OSPFv2 Interface Instance ID is set
in the OSPFv2 packet header. When receiving OSPFv2 packets, the
OSPFv2 Header Instance ID is used to aid in demultiplexing the packet
and associating it with the correct OSPFv2 instance. Received
packets with an Instance ID not equal to one of the configured OSPFv2
Instance IDs on the receiving interface MUST be discarded.
3.2. Interface Instance ID Values
The following OSPFv2 Instance IDs have been defined:
0 Base IPv4 Instance - This is the default IPv4 routing instance
corresponding to default IPv4 unicast routing and the
attendant IPv4 routing table. Use of this Instance ID
provides backward compatibility with the base OSPF
specification [OSPFV2].
1 Base IPv4 Multicast Instance - This IPv4 instance corresponds
to the separate IPv4 routing table used for the Reverse Path
Forwarding (RPF) checking performed on IPv4 multicast traffic.
2 Base IPv4 In-band Management Instance - This IPv4 instance
corresponds to a separate IPv4 routing table used for network
management applications.
3-127 Private Use - These Instance IDs are reserved for definition
and semantics defined by the local network administrator. For
example, separate Interface Instance IDs and their
corresponding OSPFv2 instances could be used to support
independent non-congruent topologies for different classes of
IPv4 unicast traffic. The details of such deployments are
beyond the scope of this document.
The first three Interface Instance IDs are analogous to the topology
IDs defined in [RFC4915].
Lindem, et al. Standards Track [Page 4]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
4. State-Sharing Optimizations between OSPFv2 Instances
This is beyond the scope of this document and is an area for further
study.
5. OSPFv2 Authentication Impacts
Now that the AuType OSPFv2 header field has been reduced from 2
octets to 1 octet, OSPFv2 routers not supporting this specification
will fail packet authentication for any instance other than the
default (i.e., the Base IPv4 Unicast Instance). This is solely due
to the difference in field definition as opposed to any explicit
change to OSPFv2 authentication, as described in Appendix D of RFC
2328 [OSPFV2] and RFC 5709 [RFC5709]. However, this is exactly what
is desired since OSPFv2 routers not supporting this specification
should only support the default instance (refer to Section 6).
6. Backward Compatibility and Deployment Considerations
When there are OSPFv2 routers that support OSPFv2 Multi-Instance
extensions on the same broadcast-capable interface as OSPFv2 routers
that do not, packets with non-zero OSPFv2 header Instance IDs are
received by those legacy OSPFv2 routers. Since the non-zero Instance
ID is included in the AuType by these legacy OSPFv2 routers, it is
misinterpreted as a mismatched authentication type and the packet is
dropped. This is exactly what is expected and desired.
Previously, there was concern that certain implementations would log
every single authentication type mismatch. However, discussions with
implementers have led us to the conclusion that this is not as severe
a problem as we'd first thought, and it will be even less of a
problem by the time the mechanism described herein is standardized,
implemented, and deployed. Most implementations will dampen the
logging of errors. Hence, the more drastic mechanisms to avoid
legacy OSPFv2 routers from receiving multicast OSPFv2 packets with
non-zero Instance IDs have been removed.
If the OSPF MIB as specified in [OSPF-MIB] is implemented, even the
damped generation of the ospfIfAuthFailure or ospfVirtIfAuthFailure
Simple Network Management Protocol (SNMP) notifications would be
undesirable in situations where legacy OSPFv2 routers are deployed on
the same subnet as OSPFv2 routers supporting this specification.
Consequently, it is recommended that implementations that implement
this specification and the OSPF MIB also implement SNMP Notification
filtering as specified in Section 6 of [RFC3413].
Lindem, et al. Standards Track [Page 5]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
7. Security Considerations
The enhancement described herein doesn't include additional security
considerations to OSPFv2. Security considerations for OSPFv2 are
described in [OSPFV2].
Given that only three OSPFv2 authentication types have been
standardized, it seems reasonable to reduce the OSPFv2 packet header
field to 8 bits.
8. IANA Considerations
The size of the AuType field is reduced from 16 octets to 8 octets.
This changes the OSPF Authentication Codes registry in that the
values 256-65535 are no longer defined and are therefore deprecated.
There is no backward compatibility issue since this range of values
was previously defined as "Reserved and should not be assigned".
A new registry has been created for OSPFv2 Instance IDs. The initial
allocation of OSPFv2 Instance IDs is described below. Refer to
Section 3.2 for more information.
+-------------+----------------------+--------------------+
| Value/Range | Designation | Assignment Policy |
+-------------+----------------------+--------------------+
| 0 | Base IPv4 Unicast | Assigned |
| | Instance | |
| | | |
| 1 | Base IPv4 Multicast | Assigned |
| | Instance | |
| | | |
| 2 | Base IPv4 In-band | Assigned |
| | Management Instance | |
| | | |
| 3-127 | Private Use | Reserved for local |
| | | policy assignment |
| | | |
| 128-255 | Unassigned | Standards Action |
+-------------+----------------------+--------------------+
OSPFv2 Instance ID
Lindem, et al. Standards Track [Page 6]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
9. References
9.1. Normative References
[OSPFV2] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998.
[OSPFV3] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
for IPv6", RFC 5340, July 2008.
[RFC-KEYWORDS]
Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
9.2. Informative References
[OSPF-MIB] Joyal, D., Ed., Galecki, P., Ed., Giacalone, S., Ed.,
Coltun, R., and F. Baker, "OSPF Version 2 Management
Information Base", RFC 4750, December 2006.
[RFC3413] Levi, D., Meyer, P., and B. Stewart, "Simple Network
Management Protocol (SNMP) Applications", STD 62, RFC
3413, December 2002.
[RFC4915] Psenak, P., Mirtorabi, S., Roy, A., Nguyen, L., and P.
Pillay-Esnault, "Multi-Topology (MT) Routing in OSPF", RFC
4915, June 2007.
[RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M.,
Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic
Authentication", RFC 5709, October 2009.
Lindem, et al. Standards Track [Page 7]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
Appendix A. Acknowledgments
Thanks to Adrian Farrel for reviewing and providing some suggested
improvements during the IESG review.
Thanks to Paul Wells for commenting on the backward compatibility
issues.
Thanks to Paul Wells and Vladica Stanisic for commenting during the
OSPF WG last call.
Thanks to Manav Bhatia for comments and for being the document
shepherd.
Thanks to Magnus Nystrom for comments under the auspices of the
Security Directorate review.
Thanks to Dan Romascanu for comments during the IESG review.
Thanks to Pete McCann for comments under the auspices of the Gen-ART
review.
Lindem, et al. Standards Track [Page 8]
^L
RFC 6549 OSPFv2 Multi-Instance Extensions March 2012
Authors' Addresses
Acee Lindem
Ericsson
102 Carric Bend Court
Cary, NC 27519
USA
EMail: acee.lindem@ericsson.com
Abhay Roy
Cisco Systems
225 West Tasman Drive
San Jose, CA 95134
USA
EMail: akr@cisco.com
Sina Mirtorabi
Cisco Systems
3 West Plumeria Drive
San Jose, CA 95134
USA
EMail: sina@cisco.com
Lindem, et al. Standards Track [Page 9]
^L
|