1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
|
Internet Engineering Task Force (IETF) D. Eastlake 3rd
Request for Comments: 7978 Huawei
Updates: 7178 M. Umair
Category: Standards Track IPinfusion
ISSN: 2070-1721 Y. Li
Huawei
September 2016
Transparent Interconnection of Lots of Links (TRILL):
RBridge Channel Header Extension
Abstract
The IETF TRILL (Transparent Interconnection of Lots of Links)
protocol includes an optional mechanism (specified in RFC 7178)
called RBridge Channel for the transmission of typed messages between
TRILL switches in the same campus and the transmission of such
messages between TRILL switches and end stations on the same link.
This document specifies extensions to the RBridge Channel protocol
header to support two features as follows: (1) a standard method to
tunnel payloads whose type can be indicated by Ethertype through
encapsulation in RBridge Channel messages; and (2) a method to
support security facilities for RBridge Channel messages. This
document updates RFC 7178.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc7978.
Eastlake, et al. Standards Track [Page 1]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Eastlake, et al. Standards Track [Page 2]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
Table of Contents
1. Introduction ....................................................4
1.1. Terminology and Acronyms ...................................4
2. RBridge Channel Header Extension Format .........................5
3. Extended RBridge Channel Payload Types ..........................8
3.1. Null Payload ...............................................8
3.2. Ethertyped Payload .........................................9
3.2.1. RBridge Channel Message as the Payload ..............9
3.2.2. TRILL Data Packet as the Payload ...................10
3.2.3. TRILL IS-IS Packet as the Payload ..................10
3.3. Ethernet Frame ............................................11
4. Extended RBridge Channel Security ..............................13
4.1. Derived Keying Material ...................................14
4.2. SType None ................................................14
4.3. IS-IS CRYPTO_AUTH-Based Authentication ....................15
4.4. DTLS Pairwise Security ....................................17
4.5. Composite Security ........................................18
5. Extended RBridge Channel Errors ................................18
5.1. SubERRs ...................................................19
5.2. Secure Nested RBridge Channel Errors ......................19
6. IANA Considerations ............................................19
6.1. Extended RBridge Channel Protocol Number ..................19
6.2. RBridge Channel Protocol Subregistries ....................20
6.2.1. RBridge Channel Error Codes ........................20
6.2.2. RBridge Channel SubError Codes .....................20
6.2.3. Extended RBridge Channel Payload Types
Subregistry ........................................20
6.2.4. Extended RBridge Channel Security Types
Subregistry ........................................21
7. Security Considerations ........................................21
8. Normative References ...........................................22
9. Informative References .........................................23
Acknowledgements ..................................................25
Authors' Addresses ................................................25
Eastlake, et al. Standards Track [Page 3]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
1. Introduction
The IETF TRILL base protocol [RFC6325] [RFC7780] has been extended
with the RBridge Channel [RFC7178] facility to support transmission
of typed messages (for example, Bidirectional Forwarding Detection
(BFD) [RFC7175]) between two TRILL switches (RBridges) in the same
campus and the transmission of such messages between RBridges and end
stations on the same link. When sent between RBridges in the same
campus, a TRILL Data packet with a TRILL Header is used, and the
destination RBridge is indicated by nickname. When sent between a
RBridge and an end station on the same link in either direction, a
native RBridge Channel message [RFC7178] is used with no TRILL
Header, and the destination port or ports are indicated by a Media
Access Control (MAC) address. (There is no mechanism to stop end
stations on the same link from sending native RBridge Channel
messages to each other; however, such use is outside the scope of
this document.)
This document updates [RFC7178] and specifies extensions to the
RBridge Channel header that provide two additional facilities as
follows:
(1) A standard method to tunnel payloads, whose type may be
indicated by Ethertype, through encapsulation in RBridge
Channel messages.
(2) A method to provide security facilities for RBridge Channel
messages. Example uses requiring such facilities are the
security of Pull Directory messages [RFC7067], address flush
messages [AddrFlush], and port shutdown messages [TRILL-AF].
Use of each of these facilities is optional, except that, as
specified below, if this header extension is implemented, there are
two payload types that MUST be implemented. Both of the above
facilities can be used in the same packet. In case of conflict
between this document and [RFC7178], this document takes precedence.
1.1. Terminology and Acronyms
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
[RFC2119].
This document uses terminology and abbreviations defined in [RFC6325]
and [RFC7178]. Some of these are listed below for convenience along
with new terms and abbreviations.
Eastlake, et al. Standards Track [Page 4]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
application_data - A DTLS [RFC6347] message type.
Data Label - VLAN or FGL.
DTLS - Datagram Transport Layer Security [RFC6347].
FCS - Frame Check Sequence.
FGL - Fine-Grained Label [RFC7172].
HKDF - HMAC-based Key Derivation Function [RFC5869].
IS-IS - Intermediate System to Intermediate System [IS-IS].
PDU - Protocol Data Unit.
MTU - Maximum Transmission Unit.
RBridge - An alternative term for a TRILL switch.
SHA - Secure Hash Algorithm [RFC6234].
Sz - Campus-wide minimum link MTU [RFC6325] [RFC7780].
TRILL - Transparent Interconnection of Lots of Links or Tunneled
Routing in the Link Layer.
TRILL switch - A device that implements the TRILL protocol
[RFC6325] [RFC7780], sometimes referred to as an RBridge.
2. RBridge Channel Header Extension Format
The general structure of an RBridge Channel message between two TRILL
switches (RBridges) in the same campus is shown in Figure 1 below.
The structure of a native RBridge Channel message sent between an
RBridge and an end station on the same link, in either direction, is
shown in Figure 2 and, compared with the first case, omits the TRILL
Header, inner Ethernet addresses, and Data Label. A Protocol field
in the RBridge Channel Header gives the type of RBridge Channel
message and indicates how to interpret the Channel-Protocol-Specific
Payload [RFC7178].
Eastlake, et al. Standards Track [Page 5]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
+-----------------------------------+
| Link Header |
+-----------------------------------+
| TRILL Header |
+-----------------------------------+
| Inner Ethernet Addresses |
+-----------------------------------+
| Data Label (VLAN or FGL) |
+-----------------------------------+
| RBridge Channel Header |
+-----------------------------------+
| Channel-Protocol-Specific Payload |
+-----------------------------------+
| Link Trailer (FCS if Ethernet) |
+-----------------------------------+
Figure 1: RBridge Channel Packet Structure
+-----------------------------------+
| Ethernet Link Header |
+-----------------------------------+
| RBridge Channel Header |
+-----------------------------------+
| Channel-Protocol-Specific Payload |
+-----------------------------------+
| FCS |
+-----------------------------------+
Figure 2: Native RBridge Channel Frame
The RBridge Channel Header looks like this:
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x8946 | CHV=0 | Channel Protocol |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ /
/ Channel-Protocol-Specific Data /
/-+-+-+-+-+- /
Figure 3: RBridge Channel Header
where 0x8946 is the RBridge-Channel Ethertype and CHV is the Channel
Header Version. This document is based on RBridge Channel version
zero.
Eastlake, et al. Standards Track [Page 6]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
The header extensions specified herein are in the form of an RBridge
Channel protocol, the Extended RBridge Channel Protocol. Figure 4
below expands the RBridge Channel Header and Protocol-Specific
Payload above for the case where the header extension is present.
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
RBridge Channel Header:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x8946 | CHV=0 | Channel Protocol=0x004|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Header Extension Specific: | SubERR| RESV4 | SType | PType |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Security Information, variable length (0 length if SType = 0) /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Tunneled Data, variable length
| ...
Figure 4: RBridge Channel Header Extension Structure
The RBridge Channel Header Protocol field is used to indicate that
the header extension is present. Its contents MUST be the value
allocated for this purpose (see Section 6). The use of an RBridge
Channel protocol to indicate extensions makes it easy to determine if
a remote RBridge in the campus supports extensions since RBridges
advertise in their LSP which such protocols they support.
The Extended RBridge Channel-Protocol-Specific Data fields are as
follows:
SubERR: This field provides further details when an error is
indicated in the RBridge Channel ERR field. If ERR is zero,
then SubERR MUST be sent as zero and ignored on receipt. See
Section 5.
RESV4: This field MUST be sent as zero. If non-zero when
received, this is an error condition. See Section 5.
SType: This field describes the type of security information and
features, including keying material, being used or provided by
the extended RBridge Channel message. See Section 4.
PType: Payload Type. This describes the tunneled data. See
Section 3.
Eastlake, et al. Standards Track [Page 7]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
Security Information: Variable-length information. Length is zero
if SType is zero. See Section 4.
The RBridge Channel Header Extension is integrated with the RBridge
Channel facility. Extension errors are reported as if they were
RBridge Channel errors, using newly allocated code points in the ERR
field of the RBridge Channel Header supplemented by the SubERR field.
3. Extended RBridge Channel Payload Types
The Extended RBridge Channel Protocol can carry a variety of payloads
as indicated by the PType (Payload Type) field. Values are shown in
the table below with further explanation below the table (see also
Section 6.2.2).
PType Description Reference
----- ----------- ---------
0 Reserved
1 Null Section 3.1 of RFC 7978
2 Ethertyped Payload Section 3.2 of RFC 7978
3 Ethernet Frame Section 3.3 of RFC 7978
4-14 Unassigned
15 Reserved
Table 1: Payload Type Values
While implementation of the RBridge Channel Header Extension is
optional, if it is implemented, PType 1 (Null) MUST be implemented
and PType 2 (Ethertyped Payload) with the RBridge-Channel Ethertype
MUST be implemented. PType 2 for any Ethertypes other than the
RBridge-Channel Ethertype MAY be implemented. PType 3 MAY be
implemented.
The processing of any particular extended header RBridge Channel
message and its payload depends on meeting local security and other
policy at the destination TRILL switch or end station.
3.1. Null Payload
The Null payload type (PType = 1) is intended to be used for testing
or for messages such as key negotiation or the like where only
security information is present. It indicates that there is no user
data payload. Any tunneled user data after the Security Information
field is ignored. If the RBridge Channel Header Extension is
implemented, the Null Payload MUST be supported in the sense that an
"Unsupported PType" error is not returned (see Section 5). Any
particular use of the Null Payload should specify what VLAN or FGL
Eastlake, et al. Standards Track [Page 8]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
and what priority should be used in the inner Data Label of the
RBridge Channel message (or in an outer VLAN tag for the native
RBridge Channel message case) when those values are relevant.
3.2. Ethertyped Payload
A PType of 2 indicates that the payload (tunneled data) of the
extended RBridge Channel message begins with an Ethertype. A TRILL
switch supporting the RBridge Channel Header Extension MUST support a
PType of 2 with a payload beginning with the RBridge-Channel
Ethertype as described in Section 3.2.1. Other Ethertypes, including
the TRILL and L2-IS-IS Ethertypes as described in Sections 3.2.2 and
3.2.3, MAY be supported.
3.2.1. RBridge Channel Message as the Payload
A PType of 2 whose payload has an initial RBridge-Channel Ethertype
indicates an encapsulated RBridge Channel message. A typical reason
for sending an RBridge Channel message inside an extended RBridge
Channel message is to provide security services, such as
authentication or encryption, for the encapsulated message.
This RBridge Channel message type looks like the following:
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | CHV=0 | Channel Protocol=0x004|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| RESV4 | SType | 0x2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ Security Information, variable length (0 length if SType = 0) /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | CHV=0 |Nested Channel Protocol|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| Nested Channel-Protocol-Specific Data ... /
/ /
Figure 5: Message Structure with RBridge Channel Payload
Eastlake, et al. Standards Track [Page 9]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
3.2.2. TRILL Data Packet as the Payload
A PType of 2 whose payload has an initial TRILL Ethertype indicates
an encapsulated TRILL Data packet as shown in Figure 6. If this
Ethertype is supported for PType = 2 and the message meets local
policy for acceptance, the TRILL Data packet is handled as if it had
been received by the destination TRILL switch on the port where the
Extended RBridge Channel message was received.
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | CHV=0 | Channel Protocol=0x004|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| RESV4 | SType | 0x2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ Security Information, variable length (0 length if SType = 0) /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TRILL (0x22F3) | V |A|C|M| RESV |F| Hop Count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Egress Nickname | Ingress Nickname |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ Optional Flags Word /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacDA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacDA continued | Inner.MacSA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacSA (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner Data Label (2 or 4 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| TRILL Data Packet payload
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 6: Message Structure with TRILL Data Packet Payload
The optional flags word is only present if the F bit in the TRILL
Header is one [RFC7780].
3.2.3. TRILL IS-IS Packet as the Payload
A PType of 2 and an initial L2-IS-IS Ethertype indicate that the
payload of the Extended RBridge Channel protocol message is an
encapsulated TRILL IS-IS PDU as shown in Figure 7. If this Ethertype
is supported for PType = 2, the tunneled TRILL IS-IS packet is
processed by the destination RBridge if it meets local policy. One
possible use is to expedite the receipt of a link state PDU (LSP) by
Eastlake, et al. Standards Track [Page 10]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
some TRILL switch or switches with an immediate requirement for the
link state information. A link local IS-IS PDU would not normally be
sent via this Extended RBridge Channel method except possibly to
encrypt the PDU since such PDUs can just be transmitted on the link
and do not normally need RBridge Channel handling. (Link local IS-IS
PDUs are (1) Hello, CSNP, PSNP [IS-IS]; (2) MTU-probe, MTU-ack
[RFC7176]; and (3) circuit scoped FS-LSP, FS-CSNP, and FS-PSNP
[RFC7356].)
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | CHV=0 | Channel Protocol=0x004|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| RESV4 | SType | 0x2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ Security Information, variable length (0 length if SType = 0) /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| L2-IS-IS (0x22F4) | 0x83 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| rest of IS-IS PDU
+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 7: Message Structure with TRILL IS-IS Packet Payload
3.3. Ethernet Frame
If PType is 3, the extended RBridge Channel payload is an Ethernet
frame as might be received from or sent to an end station except that
the encapsulated Ethernet frame's FCS is omitted, as shown in
Figure 8. (There is still an overall final FCS if the RBridge
Channel message is being sent on an Ethernet link.) If this PType is
implemented and the message meets local policy, the encapsulated
frame is handled as if it had been received on the port on which the
Extended RBridge Channel message was received.
The priority of the RBridge Channel message can be copied from the
Ethernet frame VLAN tag, if one is present, except that priority 7
SHOULD only be used for messages critical to establishing or
maintaining adjacency and priority 6 SHOULD only be used for other
important control messages.
Eastlake, et al. Standards Track [Page 11]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | 0x0 | Channel Protocol=0x004|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| RESV4 | SType | 0x3 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ Security Information, variable length (0 length if SType = 0) /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacDA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacDA (cont.) | MacSA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacSA (cont.) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Any Ethernet frame tagging...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Ethernet frame payload...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 8: Message Structure with Ethernet Frame Payload
In the case of a non-Ethernet link, such as a PPP (Point-to-Point
Protocol) link [RFC6361], the ports on the link are considered to
have link-local synthetic 48-bit MAC addresses constructed as
described below. Such a constructed address MAY be used as a MacSA.
If the RBridge Channel message is individually addressed to a link-
local port, the source TRILL switch will have the information to
construct such a MAC address for the destination TRILL switch port,
and that MAC address MAY be used as the MacDA. By the use of such a
MacSA and either such a unicast MacDA or a group-addressed MacDA, an
Ethernet frame can be sent between two TRILL switch ports connected
by a non-Ethernet link.
These synthetic TRILL switch port MAC addresses for non-Ethernet
ports are constructed as follows (and as shown in Figure 9): 0xFEFF,
the nickname of the TRILL switch used in TRILL Hellos sent on that
port, and the Port ID that the TRILL switch has assigned to that
port. (Both the Port ID of the port on which a TRILL Hello is sent
and the nickname of the sending TRILL switch appear in the Special
VLANs and Flags sub-TLV [RFC7176] in TRILL IS-IS Hellos.) The
resulting MAC address has the Local bit on and the Group bit off
[RFC7042]. However, since there will be no Ethernet end stations on
a non-Ethernet link in a TRILL campus, such synthetic MAC addresses
cannot conflict on the link with a real Ethernet port address
regardless of their values.
Eastlake, et al. Standards Track [Page 12]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0xFEFF | Nickname |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 9: Synthetic MAC Address
4. Extended RBridge Channel Security
Table 2 below gives the assigned values of the SType (Security Type)
field and their meaning. Use of DTLS Pairwise Security (SType = 2)
or Composite Security (SType = 3) is RECOMMENDED.
While IS-IS CRYPTO_AUTH-based authentication is also specified and
can be used for both pairwise and multi-destination traffic, it
provides only authentication and is not considered to meet current
security standards. For example, it does not provide for key
negotiation; thus, its use is NOT RECOMMENDED.
The Extended RBridge Channel DTLS-based security specified in
Section 4.4 and the Composite Security specified in Section 4.5 are
intended for pairwise (known unicast) use. That is, the case where
the M bit in the TRILL Header is zero and any Outer.MacDA is
individually addressed.
Multi-destination Extended RBridge Channel packets would be those
with the M bit in the TRILL Header set to one or, in the native
RBridge Channel case, the Outer.MacDA would be group addressed. The
DTLS Pairwise Security and Composite Security STypes can also be used
in the multi-destination case by serially unicasting the messages to
all data-accessible RBridges (or stations in the native RBridge
Channel case) in the recipient group. For TRILL Data packets, that
group is specified by the Data Label; for native frames, the group is
specified by the groupcast destination MAC address. It is intended
to specify a true group keyed SType to secure multi-destination
packets in a separate document [GroupKey].
Eastlake, et al. Standards Track [Page 13]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
SType Description Reference
----- ----------- ---------
0 None Section 4.2 of RFC 7978
1 IS-IS CRYPTO_AUTH-Based Section 4.3 of RFC 7978
Authentication
2 DTLS Pairwise Security Section 4.4 of RFC 7978
3 Composite Security Section 4.5 of RFC 7978
4-14 Unassigned
15 Reserved
Table 2: SType Values
4.1. Derived Keying Material
In some cases, it is possible to use material derived from IS-IS
CRYPTO_AUTH keying material [RFC5310] as an element of Extended
RBridge Channel security. It is assumed that the IS-IS keying
material is of high quality. The material actually used is derived
from the IS-IS keying material as follows:
Derived Material =
HKDF-Expand-SHA256 ( IS-IS-key, "Extended Channel" | 0x0S, L )
where "|" indicates concatenation, HKDF is as in [RFC5869], SHA256 is
as in [RFC6234], IS-IS-key is the input IS-IS keying material,
"Extended Channel" is the 16-character ASCII [RFC20] string indicated
without any leading length byte or trailing zero byte, 0x0S is a
single byte where S is the SType for which this key derivation is
being used and the upper nibble is zero, and L is the length of the
output-derived material needed.
Whenever IS-IS keying material is being used as above, the underlying
IS-IS CRYPTO_AUTH keying material [RFC5310] might expire or be
invalidated. At the time of or before such expiration or
invalidation, the use of the Derived Material from the IS-IS keying
material MUST cease. Continued security MAY use new derived material
from currently valid IS-IS CRYPTO_AUTH keying material.
4.2. SType None
No security services are being invoked. The length of the Security
Information field (see Figure 4) is zero.
Eastlake, et al. Standards Track [Page 14]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
4.3. IS-IS CRYPTO_AUTH-Based Authentication
This SType provides security for Extended RBridge Channel messages
similar to that provided for [IS-IS] PDUs by the [IS-IS]
Authentication TLV. The Security Information (see Figure 4) is as
shown in Figure 10.
1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RESV | Size |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+
| Authentication Data (Variable)
+
|
+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 10: SType 1 Security Information
o RESV: Four bits that MUST be sent as zero and ignored on receipt.
o Size: Set to 2 + the size of Authentication Data in bytes.
o Key ID: specifies the keying value and authentication algorithm
that the Key ID specifies for TRILL IS-IS LSP [RFC5310]
Authentication TLVs. The keying material actually used is always
derived as shown in Section 4.1.
o Authentication Data: The authentication data produced by the
derived key and algorithm associated with the Key ID acting on the
part of the TRILL Data packet shown. Length of the authentication
data depends on the algorithm. The authentication value is
included in the security information field and is treated as zero
when authentication is calculated.
As show in Figure 11, the area covered by this authentication starts
with the byte immediately after the TRILL Header optional Flag Word
if it is present. If the Flag Word is not present, it starts after
the TRILL Header Ingress Nickname. In either case, it extends to
just before the TRILL Data packet link trailer. For example, for an
Ethernet packet it would extend to just before the FCS.
Eastlake, et al. Standards Track [Page 15]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
+-----------------------------+
| Link Header |
+-----------------------------+
| TRILL Header |
| (plus optional Flag Word) |
+-----------------------------+ ^
| Inner Ethernet Addresses | |
+-----------------------------+ .
| Data Label (VLAN or FGL) | |
+-----------------------------+ .
| RBridge Channel Header | | <-authentication
+-----------------------------+ .
| Extended Channel Header | |
| (plus Security Information)| .
+-----------------------------+ |
| Payload | .
+-----------------------------+ v
| Link Trailer |
+-----------------------------+
Figure 11: SType 1 Authentication Coverage
In the native RBridge Channel case, this authentication coverage is
as specified in the above paragraph except that it starts with the
RBridge-Channel Ethertype, since there is no TRILL Header, inner
Ethernet addresses, or inner Data Label (see Figure 12).
+-----------------------------+
| Ethernet Header |
+-----------------------------+ ^
| RBridge Channel Header | |
+-----------------------------+ .
| Extended Channel Header | | <-authentication
| (plus Security Information)| .
+-----------------------------+ |
| Payload | .
+-----------------------------+ v
| Ethernet Trailer |
+-----------------------------+
Figure 12: Native SType 1 Authentication Coverage
RBridges, which are IS-IS routers, can reasonably be expected to hold
IS-IS CRYPTO_AUTH keying material [RFC5310] so that this SType can be
used for RBridge Channel messages, which go between RBridges. How
end stations might come to hold IS-IS CRYPTO_AUTH keying material is
Eastlake, et al. Standards Track [Page 16]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
beyond the scope of this document. Thus, this SType might not be
applicable to native RBridge Channel messages, which are between an
RBridge and an end station.
4.4. DTLS Pairwise Security
DTLS [RFC6347] supports key negotiation and provides both encryption
and authentication. The RBridge Channel Extended Header DTLS
Pairwise SType uses a negotiated DTLS version that MUST NOT be less
than 1.2.
When DTLS pairwise security is used, the entire payload of the
Extended RBridge Channel packet, starting just after the null
Security Information and ending just before the link trailer, is one
or more DTLS records [RFC6347]. As specified in [RFC6347], DTLS
records MUST be limited by the path MTU, in this case so that each
record fits entirely within a single Extended RBridge Channel
message. A minimum path MTU can be determined from the TRILL campus
minimum MTU Sz, which will not be less than 1470 bytes, by allowing
for the TRILL Data packet, extended RBridge Channel, and DTLS framing
overhead. With this SType, the security information between the
extended RBridge Channel header and the payload is null because all
the security information is in the payload area.
The DTLS Pairwise keying is set up between a pair of RBridges,
independent of Data Label, using messages of a priority configurable
at the RBridge level, which defaults to priority 6. DTLS message
types other than application_data can be the payload of an extended
RBridge Channel message with a TRILL Header using any Data Label,
and, for such DTLS message types, the PType in the RBridge Channel
Header Extension is ignored.
Actual application_data sent within such a message using this SType
SHOULD use the Data Label and priority as specified for that
application_data. In this case, the PType value in the RBridge
Channel Header Extension applies to the decrypted application_data.
TRILL switches that implement the extended RBridge Channel DTLS
Pairwise SType SHOULD support the use of certificates for DTLS, but
certificate size may be limited by the DTLS requirement that each
record fit within a single message. Appropriate certificate contents
are out of scope for this document.
TRILL switches that support the extended RBridge Channel DTLS
Pairwise SType MUST support the use of pre-shared keys. If the
psk_identity (see [RFC4279]) is two bytes, it is interpreted as a Key
ID as defined in [RFC5310], and the value derived as shown in
Section 4.1 from that key is used as a pre-shared key for DTLS
Eastlake, et al. Standards Track [Page 17]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
negotiation. A psk_identity with a length other than two bytes MAY
be used to indicate other implementation-dependent pre-shared keys.
Pre-shared keys used for DTLS negotiation SHOULD be shared only by
the pair of endpoints; otherwise, security could be attacked by
diverting messages to another endpoint holding that pre-shared key.
4.5. Composite Security
Composite Security (SType = 3) is the combination of DTLS Pairwise
Security and IS-IS CRYPTO_AUTH-Based Authentication. On
transmission, the DTLS record or records to be sent are secured as
specified in Section 4.4 then used as the payload for the application
of Authentication as specified in Section 4.3. On reception, the
IS-IS CRYPTO_AUTH-based authentication is verified first and an error
is returned if it fails. If the IS-IS CRYPTO_AUTH-based
authentication succeeds, then the DTLS record or records are
processed.
An advantage of Composite Security is that the payload is
authenticated and encrypted with a modern security protocol; in
addition, the RBridge Channel Header and (except in the native case)
preceding the MAC addresses and Data Label are provided with some
authentication.
5. Extended RBridge Channel Errors
RBridge Channel Header Extension errors are reported like RBridge
Channel errors. The ERR field is set to one of the following error
codes:
Value RBridge Channel Error Code Meaning
----- ------------------------------------
6 Unknown or unsupported field value
7 Authentication failure
8 Error in nested RBridge Channel message
Table 3: Additional ERR Values
Eastlake, et al. Standards Track [Page 18]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
5.1. SubERRs
If the ERR field is 6, the SubERR field indicates the problematic
field or value as shown in the table below. At this time no
suberrror codes are assigned under any other ERR field value.
Err SubERR Meaning (for ERR = 6)
--- ------ -----------------------
0 No Error; suberrors not allowed
1-5 (no suberrors assigned)
6 0 Reserved
6 1 Non-zero RESV4 nibble
6 2 Unsupported SType
6 3 Unsupported PType
6 4 Unknown Key ID
6 5 Unsupported Ethertype with PType = 2
6 6 Unsupported authentication algorithm for SType = 1
6 7 Non-zero SubERR with zero ERR field
7-14 (no suberrors assigned)
15 Reserved
Table 4: SubERR Values
5.2. Secure Nested RBridge Channel Errors
If
o an extended RBridge Channel message is sent with security and with
a payload type (PType) indicating an Ethertyped payload and the
Ethertype indicates a nested RBridge Channel message and
o there is an error in the processing of that nested message that
results in a return RBridge Channel message with a non-zero ERR
field,
then that returned message SHOULD also be nested in an extended
RBridge Channel message using the same type of security. In this
case, the ERR field in the Extended RBridge Channel envelope is set
to 8 indicating that there is a nested error in the message being
tunneled back.
6. IANA Considerations
6.1. Extended RBridge Channel Protocol Number
IANA has assigned 0x004 from the range assigned by Standards Action
[RFC5226] as the RBridge Channel protocol number to indicate RBridge
Channel Header Extension.
Eastlake, et al. Standards Track [Page 19]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
The added "RBridge Channel Protocols" registry in the TRILL
Parameters registry is as follows:
Protocol Description Reference
-------- -------------------------- ----------------
0x004 RBridge Channel Extension RFC 7978
6.2. RBridge Channel Protocol Subregistries
IANA has created three subregistries under the "RBridge Channel
Protocols" registry as detailed in the subsections below.
6.2.1. RBridge Channel Error Codes
IANA has assigned three additional code points in the "RBridge
Channel Error Codes" subregistry in the "Transparent Interconnection
of Lots of Links (TRILL) Parameters" registry. The additional
entries are as shown in Table 3 in Section 5 and the "Reference"
column value is "RFC 7978" for those rows.
6.2.2. RBridge Channel SubError Codes
IANA has created a subregistry indented under the "RBridge Channel
Error Codes" registry, for RBridge Channel SubError Codes. The
initial contents of this subregistry are shown in Table 4 in Section
5.1 and the fourth column "Reference" includes value "RFC 7978" for
all rows. The header information is as follows:
Registry Name: RBridge Channel SubError Codes
Registration Procedures: IETF Review
Reference: RFC 7978
6.2.3. Extended RBridge Channel Payload Types Subregistry
IANA has created an "Extended RBridge Channel Payload Types"
subregistry after the "RBridge Channel Protocols" registry in the
"Transparent Interconnection of Lots of Links (TRILL) Parameters"
registry. The header information is as follows:
Registration Procedures: IETF Review
Reference: RFC 7978
The initial registry content is in Table 1 in Section 3 of this
document.
Eastlake, et al. Standards Track [Page 20]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
6.2.4. Extended RBridge Channel Security Types Subregistry
IANA has created an "Extended RBridge Channel Security Types"
subregistry after the "Extended RBridge Channel Payload Types"
registry in the "Transparent Interconnection of Lots of Links (TRILL)
Parameters" registry. The header information is as follows:
Registration Procedures: IETF Review
Reference: RFC 7978
The initial registry content is in Table 2 in Section 4 of this
document.
7. Security Considerations
The RBridge Channel Header Extension has potentially positive and
negative effects on security.
On the positive side, it provides optional security that can be used
to authenticate and/or encrypt RBridge Channel messages. Some
RBridge Channel message payloads, such as BFD [RFC7175], provide
their own security but where this is not true, consideration should
be given, when specifying an RBridge Channel protocol, to
recommending or requiring use of the security features of the RBridge
Channel Header Extension.
On the negative side, the optional ability to tunnel more payload
types, and to tunnel them between TRILL switches and to and from end
stations, can increase risk unless precautions are taken. The
processing of decapsulated extended RBridge Channel payloads is a
place where you SHOULD NOT be liberal in what you accept. This is
because the tunneling facility makes it easier for unexpected
messages to pop up in unexpected places in a TRILL campus due to
accidents or the actions of an adversary. Local policies SHOULD
generally be strict and only accept payload types required and then
only with adequate security for the particular circumstances.
See the first paragraph of Section 4 for recommendations on SType
usage.
See [RFC7457] for security considerations of DTLS.
If IS-IS authentication is not being used, then IS-IS CRYPTO_AUTH
keying material [RFC5310] would not normally be available but that
presumably represents a judgment by the TRILL campus operator that no
security is needed.
Eastlake, et al. Standards Track [Page 21]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
See [RFC7178] for general RBridge Channel security considerations and
[RFC6325] for general TRILL security considerations.
8. Normative References
[IS-IS] International Organization for Standardization,
"Information technology -- Telecommunications and
information exchange between systems -- Intermediate System
to Intermediate System intra-domain routeing information
exchange protocol for use in conjunction with the protocol
for providing the connectionless-mode network service
(ISO 8473)", ISO/IEC 10589:2002, Second Edition, 2002.
[RFC20] Cerf, V., "ASCII format for network interchange", STD 80,
RFC 20, DOI 10.17487/RFC0020, October 1969,
<http://www.rfc-editor.org/info/rfc20>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC4279] Eronen, P., Ed., and H. Tschofenig, Ed., "Pre-Shared Key
Ciphersuites for Transport Layer Security (TLS)", RFC 4279,
DOI 10.17487/RFC4279, December 2005,
<http://www.rfc-editor.org/info/rfc4279>.
[RFC5310] Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic Authentication",
RFC 5310, DOI 10.17487/RFC5310,v February 2009,
<http://www.rfc-editor.org/info/rfc5310>.
[RFC5869] Krawczyk, H. and P. Eronen, "HMAC-based Extract-and-Expand
Key Derivation Function (HKDF)", RFC 5869,
DOI 10.17487/RFC5869, May 2010,
<http://www.rfc-editor.org/info/rfc5869>.
[RFC6325] Perlman, R., Eastlake 3rd, D., Dutt, D., Gai, S., and A.
Ghanwani, "Routing Bridges (RBridges): Base Protocol
Specification", RFC 6325, DOI 10.17487/RFC6325, July 2011,
<http://www.rfc-editor.org/info/rfc6325>.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
January 2012, <http://www.rfc-editor.org/info/rfc6347>.
Eastlake, et al. Standards Track [Page 22]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
[RFC7172] Eastlake 3rd, D., Zhang, M., Agarwal, P., Perlman, R., and
D. Dutt, "Transparent Interconnection of Lots of Links
(TRILL): Fine-Grained Labeling", RFC 7172,
DOI 10.17487/RFC7172, May 2014,
<http://www.rfc-editor.org/info/rfc7172>.
[RFC7176] Eastlake 3rd, D., Senevirathne, T., Ghanwani, A., Dutt, D.,
and A. Banerjee, "Transparent Interconnection of Lots of
Links (TRILL) Use of IS-IS", RFC 7176,
DOI 10.17487/RFC7176, May 2014,
<http://www.rfc-editor.org/info/rfc7176>.
[RFC7178] Eastlake 3rd, D., Manral, V., Li, Y., Aldrin, S., and D.
Ward, "Transparent Interconnection of Lots of Links
(TRILL): RBridge Channel Support", RFC 7178,
DOI 10.17487/RFC7178, May 2014,
<http://www.rfc-editor.org/info/rfc7178>.
[RFC7356] Ginsberg, L., Previdi, S., and Y. Yang, "IS-IS Flooding
Scope Link State PDUs (LSPs)", RFC 7356,
DOI 10.17487/RFC7356, September 2014,
<http://www.rfc-editor.org/info/rfc7356>.
[RFC7780] Eastlake 3rd, D., Zhang, M., Perlman, R., Banerjee, A.,
Ghanwani, A., and S. Gupta, "Transparent Interconnection of
Lots of Links (TRILL): Clarifications, Corrections, and
Updates", RFC 7780, DOI 10.17487/RFC7780, February 2016,
<http://www.rfc-editor.org/info/rfc7780>.
9. Informative References
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>.
[RFC6234] Eastlake 3rd, D. and T. Hansen, "US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)", RFC 6234,
DOI 10.17487/RFC6234, May 2011,
<http://www.rfc-editor.org/info/rfc6234>.
[RFC6361] Carlson, J. and D. Eastlake 3rd, "PPP Transparent
Interconnection of Lots of Links (TRILL) Protocol Control
Protocol", RFC 6361, DOI 10.17487/RFC6361, August 2011,
<http://www.rfc-editor.org/info/rfc6361>.
Eastlake, et al. Standards Track [Page 23]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
[RFC7042] Eastlake 3rd, D. and J. Abley, "IANA Considerations and
IETF Protocol and Documentation Usage for IEEE 802
Parameters", BCP 141, RFC 7042, DOI 10.17487/RFC7042,
October 2013, <http://www.rfc-editor.org/info/rfc7042>.
[RFC7067] Dunbar, L., Eastlake 3rd, D., Perlman, R., and I.
Gashinsky, "Directory Assistance Problem and High-Level
Design Proposal", RFC 7067, DOI 10.17487/RFC7067, November
2013, <http://www.rfc-editor.org/info/rfc7067>.
[RFC7175] Manral, V., Eastlake 3rd, D., Ward, D., and A. Banerjee,
"Transparent Interconnection of Lots of Links (TRILL):
Bidirectional Forwarding Detection (BFD) Support",
RFC 7175, DOI 10.17487/RFC7175, May 2014,
<http://www.rfc-editor.org/info/rfc7175>.
[RFC7457] Sheffer, Y., Holz, R., and P. Saint-Andre, "Summarizing
Known Attacks on Transport Layer Security (TLS) and
Datagram TLS (DTLS)", RFC 7457, DOI 10.17487/RFC7457,
February 2015, <http://www.rfc-editor.org/info/rfc7457>.
[AddrFlush]
Hao, W., Eastlake, D., and Y. Li, "TRILL: Address Flush
Message", Work in Progress, draft-ietf-trill-address-
flush-00, May 2016.
[GroupKey]
Eastlake, D., "TRILL: Group Keying", Work in Progress,
draft-eastlake-trill-group-keying-00, July 2016.
[TRILL-AF]
Eastlake, D., Li, Y., Umair, M., Banerjee, A., and F. Hu,
"TRILL: Appointed Forwarders", Work in Progress,
draft-ietf-trill-rfc6439bis-03, August 2016.
Eastlake, et al. Standards Track [Page 24]
^L
RFC 7978 TRILL: RBridge Channel Extension September 2016
Acknowledgements
The contributions of the following are hereby gratefully
acknowledged:
Stephen Farrell, Jonathan Hardwick, Susan Hares, Gayle Noble, Alvaro
Retana, Yaron Sheffer, and Peter Yee.
Authors' Addresses
Donald E. Eastlake, 3rd
Huawei Technologies
155 Beaver Street
Milford, MA 01757
United States of America
Phone: +1-508-333-2270
Email: d3e3e3@gmail.com
Mohammed Umair
IPinfusion
Email: mohammed.umair2@gmail.com
Yizhou Li
Huawei Technologies
101 Software Avenue
Nanjing 210012
China
Phone: +86-25-56622310
Email: liyizhou@huawei.com
Eastlake, et al. Standards Track [Page 25]
^L
|