LSR Working Group A. Wang Internet-Draft China Telecom Intended status: Standards Track A. Lindem Expires:February 28,March 15, 2020 Cisco Systems J. Dong Huawei Technologies P. Psenak K. Talaulikar Cisco SystemsAugust 27,September 12, 2019 OSPFExtension forPrefix Originatordraft-ietf-lsr-ospf-prefix-originator-03Extension draft-ietf-lsr-ospf-prefix-originator-04 Abstract This documentdescribesdefines Open Shortest Path First (OSPF)v2 and OSPFv3encodings to advertise the router-id of the originator of inter-area prefixes for OSPFv2 and OSPFv3 Link-StateAdvertisement (LSA), which areAdvertisements (LSAs). The source originator is needed in severaluse cases inmulti-area OSPF use cases. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onFebruary 28,March 15, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Conventions used in this document . . . . . . . . . . . . . . 3 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.Conventions used in this document . . . . . . . .Inter-Area Prefix Source Advertisement Use Cases . . . . . . 4 5.Scenario Description . . . . . . . . . . . . . . . . . . . . 4 6.Prefix Source Router-ID sub-TLV . . . . . . . . . . . . . . . 57. Extended LSA6. Elements of Procedure . . . . . . . . . . . . . . . . . . . . 68.7. Security Considerations . . . . . . . . . . . . . . . . . . . 69.8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 710.9. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 711.10. References . . . . . . . . . . . . . . . . . . . . . . . . . 711.1.10.1. Normative References . . . . . . . . . . . . . . . . . . 711.2.10.2. Informative References . . . . . . . . . . . . . . . . .89 Appendix A. Inter-Area Topology Retrieval Process . . . . . . . 9 Appendix B. Special Considerations on Inter-Area Topology Retrieval . . . . . . . . . . . . . . . . . . . . .910 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 1. Introduction [I-D.ietf-ospf-mpls-elc] defines mechanisms to advertise Entropy Readable Label Depth (ERLD) for ingress Label SwitchingRouterRouters (LSR) to discovereachother LSR's capability of performing Entropy Label(EL) -based load- balancingbased load-balancing inMulti Protocol Label Switch (MPLS)MPLS networks. The ingress LSR can use this information topushconstruct the appropriate label stack for specifictraffic,traffic requirements, especially in segmentrouting environmentsrouted networks and other deployments requiring stackedLSPs scenarios.LSPs. However, in inter-area scenarios, the Area Border Router (ABR) does not advertise the originating OSPF router-id for inter-area prefixes. An OSPF router in one area doesn't knowwherethe origin area of inter-area prefixesreally came fromand can't determine the router that originatedinter-areathese prefixesand then can't judgeor the ERLD capabilities of the destination.ItTherefore, it is necessary totransferadvertise the originatorinformationof these inter-area prefixes to ensure the ingress LSRconstructscan construct therightappropriate label stack. More generally, [RFC8476] defines a mechanism to advertise multiple types of supported Maximum SID Depths (MSD) at node and/or link granularity. This information will be referred when the head-end router starts to send traffic to destination prefixes. In inter-area scenario, it is also necessary for the sender to learn the capabilities of the receivers associated with the inter-area prefixes. There isalsoanother scenario where knowing the originator ofinter- areainter-area prefixes is useful. For example, Border Gateway ProtocolLink- StateLink-State (BGP-LS) [RFC7752] describes mechanisms using the BGP protocol to advertise Link-State information. This information can enableana Software Definition Network (SDN) controller tocollectautomatically determine the underlay networktopology automatically. Buttopology. However, if the underlay network isdividedpartitioned into multiple areas and running the OSPF protocol, it is not easy for the SDN controller to rebuild the multi-areatopology, because normally antopology since ABR that connects multiple areas will normally hide the detailed topologyinformationfor these non-backbone areas. If only the internal routers within backbone area run the BGP-LS protocol, they just learn and report the summary network information from the non-backbone areas. If the SDN controller can learn the originator of the inter-area prefixes, it is possible to rebuild the inter-areatopology automatically.topology. [RFC7794] introduces the Intermediate System to Intermediate System (IS-IS) "IPv4/IPv6 Source Router IDs" Type-Length-Value (TLV) to advertise the source oftheprefixesredistributedleaked from a different IS-IS level. This TLV can be used in the above scenarios. Such solution can also be applied in networks that run the OSPF protocol, butthe relatedexisting OSPF LSAsTLVTLVs must beextended.extended to include the router originating the prefix. This draft provides such solution for the OSPFv2 and OSPFv3 protocols. 2. Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119].[RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Terminology The following terms are used in this document: o ABR: Area Border Router o ERLD: Entropy Readable Label Depth o EL: Entropy Label o IS-IS: Intermediate System to Intermediate System o LSA: Link-State Advertisement o MSD: Maximum SID Depths o NLRI: Network Layer Reachability Information o OSPF: Open Shortest Path First o SID: Segment IDentifier o SDN: Software Definition Network 4.Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] . 5. Scenario DescriptionInter-Area Prefix Source Advertisement Use Cases Figure 1 illustratesthea topologyscenario whenwhere OSPF is running inmulti-area.multiple areas. R0-R4 are routers in the backbone area,S1-S4,T1-T4S1-S4 are internal routers in area11, and T1-T4 are internal routers in area2 respectively.2. R1 and R3 arearea border routersABRs between area 0 and area 1. R2 and R4 arearea border routersABRs between area 0 and area 2. N1 is the network between router S1 and S2 and N2 is the network between router T1 and T2. Ls1 is the loopback address of Node S1 and Lt1 is the loopback address of Node T1. +-----------------+ |IP SDN Controller| +--------+--------+ | | BGP-LS | +---------------------+------+--------+-----+--------------+ | +--+ +--+ ++-+ ++-+ +-++ + -+ +--+| | |S1+--------+S2+---+R1+---|R0+----+R2+---+T1+--------+T2|| | +-++ N1 +-++ ++-+ +--+ +-++ ++++ N2 +-++| | | | | | || | | | | | | | || | | | +-++ +-++ ++-+ +-++ ++++ +-++| | |S4+--------+S3+---+R3+-----------+R4+---+T3+--------+T4|| | +--+ +--+ ++-+ +-++ ++-+ +--+| | | | | | | | | | Area 1 | Area 0 | Area 2 | +---------------------+---------------+--------------------+ Figure 1: OSPF Inter-Area Prefix Originator Scenario If S1 wants to send traffic to prefix Lt1 that is connected to T1 in another area, it should know theERLD,ERLD and MSD valuesthat areassociated with the node T1, and then construct the right label stack at the ingress node forthe target traffic.traffic destined to prefix Lt1. In another scenario, If R0 has some method to learn the originator of network N1 and reports such information to IP SDN controller, then it is possible for the controller toretrievalreconstruct the topology innon- backbone area.the non-backbone areas. The topologyretrievalreconstruction process and itsusage limitationlimitations are described in the Appendix A and AppendixB .B. From the above scenarios, we can conclude it is useful tointroduce anddefine the OSPF prefix originator sub TLVwithin OSPF. 6.. 5. Prefix Source Router-ID sub-TLV [RFC7684] and [RFC8362] respectively definethe TLV extensionsTLV-based LSAs for OSPFv2 andOSPFv3 respectively.OSPFv3. These documents facilitate addition of new attributes forprefixes. Based on these formats, we can define newprefixes and provide the basis for a sub-TLV to advertise the "Prefix Source RouterID", as that definedID". For OSPFv2, this sub-TLV is a sub-TLV of OSPFv2 Extended Prefix TLV which SHOULD be included in[RFC7794].the "OSPFv2 Extended Prefix Opaque LSA" [RFC7684] for inter-area prefixes. For OSPFv3, this sub-TLV is a sub-TLV of "Inter-Area-Prefix TLV", which SHOULD be included in the "E-Inter-Area-Prefix-LSA" [RFC8362]. The "Prefix Source Router-ID" sub-TLV has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Prefix Source Router-ID | +---------------------------------------------------------------+ Figure 2: Prefix Source Router-ID sub-TLV Format o Source Router-ID Sub-TLV Type:TBD1[RFC7684]TBD1 [RFC7684] or TBD2 [RFC8362] o Length: 4 o Value: Router-ID of OSPFv2/OSPFv3sourcerouterFor OSPFv2, this sub-TLVthat isa sub-TLVthe source ofOSPFv2 Extended Prefix TLV, which SHOULD be included inthe"OSPFv2 Extended Prefix Opaque LSA" . For OSPFv3, this sub-TLV is aprefix. This sub-TLVof "Inter-Area-Prefix TLV", which SHOULD be included inprovides the"E-Inter-Area-Prefix-LSA". 7. Extended LSAsame functionality as the IS-IS "IPv4/IPv6 Source Router" TLV defined in [RFC7794]. 6. Elements of Procedure When an ABR, for example R2 in Figure 1, receivesthea Router-LSAannouncementadvertisement in area 2, itshouldSHOULD originate the corresponding "OSPFv2 Extended Prefix Opaque LSA" for OSPFv2 or"E-Inter-Area-Prefix-LSA""E-Inter-Area- Prefix-LSA" for OSPFv3 that includes the Source Router-ID sub-TLV for the networkprefixes, e.g., for prefix Lt1, N2. etc., which identifiesprefixes. For example, to identify the source routerthat advertised the prefix.prefix Lt1 and other inter-area prefixes in Figure 1. WhenS1a router in anotherareaarea, e.g., S1, receives such LSA, it then canlearnascertain that prefix Lt1 is associated with nodeT1, checkT1 and obtain theERLD,ERLD or MSD valueaccording to its necessity,from T1's Router-Information LSA [RFC7770] and construct the right label stack at the ingress node S1 forthetraffic destined to prefix Lt1. WhenR0a router in another area, e.g., R0, receives such LSA, it learns the Prefix Source Router-id and includes it in the prefix information advertised to an SDN controller as describedin[I-D.ietf-idr-bgp-ls-segment-routing-ext].in [I-D.ietf-idr-bgp-ls-segment-routing-ext]. The SDN controller can then use such information to build the inter-area topology according to the process described in the Appendix A. The topology retrieval process may not suitable for some environments as stated in Appendix B.8.7. Security ConsiderationsSecurity concernsSince this document extends the "OSPFv2 Extended Prefix LSA" and "OSPFv3 E-Inter-Area-Prefix LSA", the security considerations forOSPF[RFC7684] and [RFC8362] areaddressed in [RFC5709] Advertisementapplicable. Modification of theadditional information"Prefix Source Sub-TLV" could be used for a Denial-of-Service attack and could inhibit the use cases described in Section 4. If the OSPF domain is vulnerable to such attacks, OSPF authentication should be used as defined for OSPFv2 inthis document introduces[RFC5709] and [RFC7474] and for OSPFv3 in [RFC7166]. Additionally, advertisement of the prefix source for inter-area prefixes facilitates reconstruction of the OSPF topology for other areas. Network operators may consider their topologies to be sensitive confidential data. For OSPFv3, IPsec can be used to provide confidentiality [RFC4552]. Since there is nonew security concerns 9.standard defined for native OSPFv2 IPsec, some form of secure tunnel is required to provide confidentiality. 8. IANA Considerations This specification definesonethe Prefix Source Router-ID sub-TLV as described in Section6.5. This value should be added to the both existing "OSPFv2 Extended Prefix TLV Sub-TLVs"registryand "OSPFv3 Extended- LSASub-TLVs registry" respectively.Sub-TLVs" registries. The followingnewsub-TLV is added to theregistry of"OSPFv2 Extended Prefix TLVSub-TLVs".Sub-TLVs" registry. The allocation policy is IETF Reviewthatas defined in [RFC7684]+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Code Point | Description | Status |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TBD | Prefix Source Sub-TLV | Allocation from IANA |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3:CodePointCode Point in "OSPFv2 Extended Prefix TLV Sub-TLVs" The followingnewsub-TLV is added to theregistry of"OSPFv3 Extended-LSASub-TLVs".Sub-TLVs" registry. The allocation policy is IETF Reviewthatas defined in [RFC8362]+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Code Point | Description | Status |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TBD | Prefix Source Sub-TLV | Allocation from IANA |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+++++++++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 4:CodePointCode Point in "OSPFv3 Extended-LSA Sub-TLVs"10.9. Acknowledgement Many thanks to Les Ginsberg for hisvaluablesuggestions on this draft.And alsoAlso thanks to JeffTantsura,RobTantsura, Rob Shakir, Gunter Van DeVelde Gunter,Velde, Goethals Dirk, Shaofu Peng, and John E Drake for their valuablecomments on this draft. 11.comments. 10. References11.1.10.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality for OSPFv3", RFC 4552, DOI 10.17487/RFC4552, June 2006, <https://www.rfc-editor.org/info/rfc4552>. [RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M., Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic Authentication", RFC 5709, DOI 10.17487/RFC5709, October 2009, <https://www.rfc-editor.org/info/rfc5709>. [RFC7166] Bhatia, M., Manral, V., and A. Lindem, "Supporting Authentication Trailer for OSPFv3", RFC 7166, DOI 10.17487/RFC7166, March 2014, <https://www.rfc-editor.org/info/rfc7166>. [RFC7474] Bhatia, M., Hartman, S., Zhang, D., and A. Lindem, Ed., "Security Extension for OSPFv2 When Using Manual Key Management", RFC 7474, DOI 10.17487/RFC7474, April 2015, <https://www.rfc-editor.org/info/rfc7474>. [RFC7684] Psenak, P., Gredler, H., Shakir, R., Henderickx, W., Tantsura, J., and A. Lindem, "OSPFv2 Prefix/Link Attribute Advertisement", RFC 7684, DOI 10.17487/RFC7684, November 2015, <https://www.rfc-editor.org/info/rfc7684>.[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel,[RFC7770] Lindem, A., Ed., Shen, N., Vasseur, JP., Aggarwal, R., and S.Ray, "North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP",Shaffer, "Extensions to OSPF for Advertising Optional Router Capabilities", RFC7752,7770, DOI10.17487/RFC7752, March10.17487/RFC7770, February 2016,<https://www.rfc-editor.org/info/rfc7752>.<https://www.rfc-editor.org/info/rfc7770>. [RFC7794] Ginsberg, L., Ed., Decraene, B., Previdi, S., Xu, X., and U. Chunduri, "IS-IS Prefix Attributes for Extended IPv4 and IPv6 Reachability", RFC 7794, DOI 10.17487/RFC7794, March 2016, <https://www.rfc-editor.org/info/rfc7794>. [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. [RFC8362] Lindem, A., Roy, A., Goethals, D., Reddy Vallem, V., and F. Baker, "OSPFv3 Link State Advertisement (LSA) Extensibility", RFC 8362, DOI 10.17487/RFC8362, April 2018, <https://www.rfc-editor.org/info/rfc8362>. [RFC8476] Tantsura, J., Chunduri, U., Aldrin, S., and P. Psenak, "Signaling Maximum SID Depth (MSD) Using OSPF", RFC 8476, DOI 10.17487/RFC8476, December 2018, <https://www.rfc-editor.org/info/rfc8476>.11.2.10.2. Informative References [I-D.ietf-idr-bgp-ls-segment-routing-ext] Previdi, S., Talaulikar, K., Filsfils, C., Gredler, H., and M. Chen, "BGP Link-State extensions for Segment Routing", draft-ietf-idr-bgp-ls-segment-routing-ext-16 (work in progress), June 2019. [I-D.ietf-ospf-mpls-elc] Xu, X., Kini, S., Psenak, P., Filsfils, C., and S. Litkowski, "Signaling Entropy Label Capability and Entropy Readable Label-stack Depth Using OSPF", draft-ietf-ospf-mpls-elc-08mpls-elc-09 (work in progress),MaySeptember 2019. [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and S. Ray, "North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP", RFC 7752, DOI 10.17487/RFC7752, March 2016, <https://www.rfc-editor.org/info/rfc7752>. Appendix A. Inter-Area Topology Retrieval Process When an IP SDN Controller receivesthisBGP-LS [RFC7752] information, it should compare the prefix Network Layer Reachability Information (NLRI) that is included in the BGP-LSpacket.NLRI. When it encounters the same prefix but with different source router ID, it should extract the corresponding area-ID, rebuild the link between these twodifferentsource routers in the non-backbone area.BelowsBelow is one example that based on the Figure 1: Assuming we want to rebuild the connection between router S1 and router S2that locateslocated in area 1: a. Normally, router S1 will advertise prefix N1 within its router- LSA. b. When this router-LSA reaches the ABR router R1, it will convert it into summary-LSA, add the Prefix Source Router-ID sub-TLV, which is router id of S1 in this example. c. R1 then floods this extension summary-LSA to R0, which isrunningusing the BGP-LS protocol with IP SDN Controller. The controller then knows theprefixes ofprefix for N1 is from S1. d. Router S2 willdo theperform a similar process, and the controller will also learn thatprefixesprefix N1 is also from S2. e. Then it can reconstruct the link between S1 and S2, using the prefix N1. The topology within Area 1 can then be reconstructed accordingly. Iterating the above process continuously, the IP SDN controller can retrieve a detailed topology that spans multiple areas. Appendix B. Special Considerations on Inter-Area Topology Retrieval The above topology retrieval process can be applied in the case where each point-to-point or multi-access linkbetweenconnecting routers is assigned a unique prefix. However, there are some situations where this heuristic cannot be applied. Specifically, the cases where the link is unnumbered or the prefix corresponding to the link is an anycast prefix. The Appendix A heuristic to rebuild the topology can normally be used if all links are numbered. For anycast prefixes, if it corresponds to the loopback interface and has a host prefix length, i.e., 32 for IPv4 prefixes and 128 for IPv6 prefixes, Appendix A can alsoapply.applied since these anycast prefixes are not required to reconstruct the topology. Authors' Addresses Aijun Wang China Telecom Beiqijia Town, Changping District Beijing 102209 China Email: wangaj3@chinatelecom.cn Acee Lindem Cisco Systems 301 Midenhall Way Cary, NC 27513 USA Email: acee@cisco.com Jie Dong Huawei Technologies Beijing China Email: jie.dong@huawei.com Peter Psenak Cisco Systems Pribinova Street 10 Bratislava, Eurovea Centre, Central 3 81109 Slovakia Email: ppsenak@cisco.com Ketan Talaulikar Cisco Systems S.No. 154/6, Phase I, Hinjawadi Pune 411 057 India Email: ketant@cisco.com