PIM WG Yiqun Cai Internet Draft Heidi Ou Intended Status: Proposed Standard Expires: April 27, 2009 Cisco Systems, Inc. October 27, 2008 PIM Multi-Topology ID (MT-ID) Join-Attribute draft-cai-pim-mtid-00.txt Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract This document introduces a new type of PIM Join Attribute that extends PIM signaling to identify a topology that should be used when constructing a particular multicast distribution tree. Cai & Ou [Page 1] Internet Draft draft-cai-pim-mtid-00.txt October 2008 Table of Contents 1 Specification of Requirements ...................... 2 2 Introduction ....................................... 2 3 Functional Overview ................................ 3 3.1 PIM RPF Topology ................................... 3 3.2 PIM MT-ID .......................................... 4 3.3 Applicability ...................................... 4 4 Protocol Specification of PIM MT-ID ................ 4 4.1 Sending PIM MT-ID Join Attribute ................... 4 4.2 Receiving PIM MT-ID Join Attribute ................. 5 4.3 Validating PIM MT-ID Join Attribute ................ 5 4.4 Conflict Resolution ................................ 6 4.4.1 Upstream Routers ................................... 6 4.4.2 Downstream Routers ................................. 6 5 PIM MT-ID Join Attribute TLV Format ................ 7 6 IANA Considerations ................................ 7 7 Security Considerations ............................ 7 8 Acknowledgments .................................... 8 9 Authors' Addresses ................................. 8 10 Normative References ............................... 8 11 Informative References ............................. 9 12 Full Copyright Statement ........................... 9 13 Intellectual Property .............................. 9 1. Specification of Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 2. Introduction Some unicast protocols, such as OSPF and IS-IS, allow a single network to be viewed as multiple topologies [RFC4915, RFC5120]. This enables PIM to construct multicast distribution trees using separate network paths even when the roots of the trees are the same. This capability can be used to improve the resilience of multicast applications. For instance, a multicast stream can be duplicated and Cai & Ou [Page 2] Internet Draft draft-cai-pim-mtid-00.txt October 2008 transported using different network layer addresses simultaneously. Assuming that two source trees, (S1, G1) and (S1, G2), are used for the stream. By using MT capable unicast routing protocols and procedures described in this document, it is possible to construct two source trees for (S1, G1) and (S1, G2) in such a way that they do not share any transit network segment. As a result, a single network failure will not cause any loss to the stream. This draft introduces a new type of PIM Join Attribute used to encode the identity of the topology PIM uses for RPF. It is based on [ID.ietf-pim-join-attributes], and specifies additional procedures and rules to process the attribute and resolve conflict. 3. Functional Overview 3.1. PIM RPF Topology PIM RPF topology is a collection of routes used by PIM to perform RPF operation when building shared or source trees. In the rest of the document, PIM RPF topology may be simply referred to as "topology" when there is no ambiguity. In a multi-topology environment, multiple RPF topologies can be created in the same network. A particular source may be reachable in only one of the topologies, or in several of them via different paths. To select the RPF topology for a particular multicast distribution tree, one or more of the following can be done. 1. configure a policy that maps a group range to a topology. When RPF information needs to be resolved for the RP or the sources for a group within the range, the RPF lookup takes place in the specified topology. This can be used for PIM-SM/SSM/Bidir. 2. configure a policy that maps a source prefix range to a topology. This can be used for PIM-SM and PIM-SSM. 3. use the topology identified by the Join Attribute encoding in the received PIM packets. The details of the first two methods are implementation specific and are not discussed in this document. The specification to support the third method is included in this document. Cai & Ou [Page 3] Internet Draft draft-cai-pim-mtid-00.txt October 2008 3.2. PIM MT-ID For each PIM RPF topology created, a unique numerical ID is assigned. This ID is called PIM MT-ID. PIM MT-ID has the following property, - this value is not required to be the same as the MT-ID used by the unicast routing protocols that contribute routes to the topology. Although in practice, when only one unicast routing protocol (such as OSPF or IS-IS) is used, PIM MT-ID is typically assigned the same value as the IGP topology identifier. - this value must be unique and consistent within the network domain for the same topology - 0 is reserved as the default, and MUST NOT be included in the join attribute encoding. - how to assign a PIM MT-ID to a topology is decided by the network administrator and is outside the scope of this document 3.3. Applicability The PIM MT-ID join attribute described in this draft applies to PIM Join/Assert packets used by PIM SM/SSM/Bidir. It is not used in any other PIM packets, such as Prune, Register, Register-Stop, Graft, Graft-ack, DF Election, Candidate-RP, and Bootstrap. As such, it can only be used to build shared or source trees for PIM SM/SSM and PIM- bidir downstream. When this attribute is used in combination with RPF vectors defined in [ID.ietf-pim-rpf-vector] [ID.ietf-l3vpn-2547bis-mcast], they are processed against the topology identified by the PIM MT-ID attribute. 4. Protocol Specification of PIM MT-ID 4.1. Sending PIM MT-ID Join Attribute When a PIM router originates a PIM Join/Assert packet, it may choose to encode PIM MT-ID of the topology in which RPF lookup takes place for the corresponding (*,G) or (S,G) entry. The chosen PIM MT-ID MUST be the one decided by local topology selection configuration if it exists, or the one received from downstream routers after conflict resolution procedures are applied. Cai & Ou [Page 4] Internet Draft draft-cai-pim-mtid-00.txt October 2008 The following are the exceptions, - a router MUST NOT attach the attribute if PIM MT-ID is 0. The value of 0 is ignored on reception. - a router SHOULD NOT do so if the upstream router, or one of the routers on the LAN does not include "PIM Join Attribute" option in its Hello packets. - a router SHOULD NOT encode PIM MT-ID for pruned sources. If encoded, the value is ignored. 4.2. Receiving PIM MT-ID Join Attribute When a PIM router receives a PIM MT-ID join attribute in a Join/Assert packet, it MUST perform the following, - validate the attribute encoding. The detail is described in the next section. - if the join attribute is valid, use the rules described in the section "Conflict Resolution" to determine a PIM MT-ID to use. - use the topology identified by the selected PIM MT-ID to perform RPF lookup for the (*,G)/(S,G) entry unless a different topology is specified by a local configuration. The local configuration always takes precedence. 4.3. Validating PIM MT-ID Join Attribute An encoded PIM MT-ID join attribute is valid if all of the following conditions are satisfied, - there is at most 1 PIM MT-ID attribute encoded. - the length field must be 2 and the value must not be 0. If an encoded PIM MT-ID join attribute is deemed invalid, it is ignored and not forwarded further. The packet is processed as if the attribute were not present. It is important to note that, if the sender is not a PIM neighbor that has included "PIM Join Attribute" option in its Hello packets, Cai & Ou [Page 5] Internet Draft draft-cai-pim-mtid-00.txt October 2008 or if the "F" bit in the encoding is reset, the encoding may still be considered valid by an implementation and is allowed to be forwarded. 4.4. Conflict Resolution Depending on whether a PIM router is an upstream or a downstream router, the action it takes to resolve conflicting PIM MT-ID attributes differs. The detail is described below. 4.4.1. Upstream Routers If an upstream router has a local configuration that specifies a different topology than that from an incoming Join/Assert packet, including the case PIM MT-ID is not encoded in the incoming packet, it is not considered a conflict. A conflict occurs when a router doesn't have local topology selection policy and it has received different PIM MT-ID from Join packets sent by its downstream routers or Assert packets from another forwarding router on the LAN. - if an upstream router receives different PIM MT-ID attributes from PIM Join packets, it MUST follow the rules specified in [ID.ietf-pim-join-attributes] to select one. The PIM MT-ID chosen will be the one encoded for its upstream neighbor. - if an upstream router receives a different PIM MT-ID attribute in an ASSERT packet, it MUST use the tie-breaker rules as specified in [RFC4601] to determine an ASSERT winner. PIM MT-ID is not considered in deciding a winner from Assert process. 4.4.2. Downstream Routers A conflict is detected by a downstream router when it sees a different PIM MT-ID attribute from other routers on the LAN, regardless of whether the router has local topology selection policy or not. - if a downstream router sees different PIM MT-ID attributes from PIM Join packets, it MUST follow the specification of [RFC4601] as if the attribute did not exist. For example, the router suppresses its own Join packet if a Join for the same (S,G) is seen. The router MUST NOT use the rules specified in [ID.ietf-pim- Cai & Ou [Page 6] Internet Draft draft-cai-pim-mtid-00.txt October 2008 join-attributes] to select a PIM MT-ID from Join packets sent by other downstream routers. - if a downstream router sees its preferred upstream router loses in the ASSERT process, and the ASSERT winner uses a different PIM MT-ID, the downstream router SHOULD still choose the ASSERT winner as the RPF neighbour but it MUST NOT encode PIM MT-ID when sending Join packets to it. 5. PIM MT-ID Join Attribute TLV Format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |F|E| Attr Type | Length | Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - F bit: 1 Transitive Attribute. - E bit: As specified by [ID.ietf-pim-join-attributes] - Attr Type: 3. - Length: 2. - Value: PIM MT-ID, 1 to 65535. 6. IANA Considerations A new PIM Join Attribute type needs to be assigned. 3 is proposed for now. 7. Security Considerations As a type of PIM Join Attribute, the security considerations described in [ID.pim-join-attributes] apply here. Specifically, malicious alteration of PIM MT-ID may cause the resiliency goals to be violated. Cai & Ou [Page 7] Internet Draft draft-cai-pim-mtid-00.txt October 2008 8. Acknowledgments The authors would like to thank Eric Rosen, Ice Wijnands, Dino Farinacci, Colby Barth and Les Ginsberg for their input. 9. Authors' Addresses Yiqun Cai Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134 E-mail: ycai@cisco.com Heidi Ou Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134 E-mail: hou@cisco.com 10. Normative References [RFC2119] S. Bradner, "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, March 1997. [RFC4601] Fenner, B., Handley, M., Holbrook, H., and I. Kouvelas, "Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)", RFC 4601, August 2006. [ID.ietf-pim-join-attributes] A. Boers, I. Wijnands, E. Rosen, "The PIM Join Attribute Format", draft-ietf-pim-join-attributes. Cai & Ou [Page 8] Internet Draft draft-cai-pim-mtid-00.txt October 2008 11. Informative References [RFC4915] P. Psenak, S. Mirtorabi, A. Roy, L. Nguyen, P. Pillay- Esnault, "Multi-Topology (MT) Routing in OSPF", RFC 4915, June 2007. [RFC5120] T. Przygienda, N. Shen, N. Sheth, "M-ISIS: Multi Topology (MT) Routing in Intermediate System to Intermediate Systems (IS- ISs)", RFC 5120, February 2008. [ID.ietf-pim-rpf-vector] I. Wijnands, A. Boers, E. Rosen, "The RPF Vector TLV", draft-ietf-pim-rpf-vector. [ID.ietf-l3vpn-2547bis-mcast] E. Rosen,R Aggarwal, "Multicast in MPLS/BGP IP VPNs", draft-ietf-l3vpn-2547bis-mcast 12. Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 13. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this Cai & Ou [Page 9] Internet Draft draft-cai-pim-mtid-00.txt October 2008 specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Cai & Ou [Page 10]