LSR Working Group A. Wang Internet-Draft China Telecom Intended status: Standards Track A. Lindem Expires:May 28, 2020January 1, 2021 Cisco Systems J. Dong Huawei Technologies P. Psenak K. Talaulikar Cisco SystemsNovember 25, 2019June 30, 2020 OSPF Prefix OriginatorExtension draft-ietf-lsr-ospf-prefix-originator-05Extensions draft-ietf-lsr-ospf-prefix-originator-06 Abstract This document definesOpen Shortest Path First (OSPF) encodingsOSPF extensions toadvertiseinclude information associated with therouter-id ofnode originating a prefix along with theoriginator of inter-area prefixes for OSPFv2 and OSPFv3 Link-State Advertisements (LSAs). The source originator is needed in several multi-area OSPF use cases.prefix advertisement. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onMay 28, 2020.January 1, 2021. Copyright Notice Copyright (c)20192020 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 22. Conventions used in this document1.1. Requirements Language . . . . . . . . . . . . . .3 3. Terminology. . . . 3 2. Protocol Extensions . . . . . . . . . . . . . . . . . . . . . 34. Inter-Area2.1. Prefix SourceAdvertisement Use CasesRouter-ID Sub-TLV . . . . . .4 5. External Prefix Source Advertisement Use Cases. . . . . . .5 6.4 2.2. PrefixSource Router-ID sub-TLVOriginator Sub-TLV . . . . . . . . . . . . . . .6 7.. 4 3. Elements of Procedure . . . . . . . . . . . . . . . . . . . .7 7.1. Inter-Area Prefixes . . . . . . . . . . . . . . . . . . . 7 7.2. External Prefixes . . . . . . . . . . . . . . . . . . . . 7 8.5 4. Security Considerations . . . . . . . . . . . . . . . . . . .7 9.6 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . .8 10.7 6. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . .8 11.7 7. References . . . . . . . . . . . . . . . . . . . . . . . . .9 11.1.7 7.1. Normative References . . . . . . . . . . . . . . . . . .9 11.2.7 7.2. Informative References . . . . . . . . . . . . . . . . .108 Appendix A. Inter-Area Topology Retrieval Process . . . . . . .109 Appendix B. Special Considerations on Inter-Area Topology Retrieval . . . . . . . . . . . . . . . . . . . . .1110 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .1110 1. Introduction[I-D.ietf-ospf-mpls-elc] defines mechanisms to advertise Entropy Readable Label Depth (ERLD) for ingress Label Switching Routers (LSR) to discover other LSR's capability of performing Entropy Label based load-balancingPrefix attributes are advertised inMPLS networks. The ingress LSR can use this information to constructOSPFv2 [RFC2328] using theappropriate label stack for specific traffic requirements, especially in segment routed networksExtended Prefix Opaque Link State Advertisement (LSA) [RFC7684] andother deployments requiring stacked LSPs. However,ininter-area scenarios,OSPFv3 [RFC5340] using theArea Border Router (ABR) does not advertisevarious Extended Prefix LSA types [RFC8362]. The identification of the originatingOSPF router-id for inter-area prefixes. An OSPFrouter for a prefix inone area doesn't knowOSPF varies by theorigin areatype ofinter-area prefixesthe prefix andcan't determineis currently not always possible. For intra-area prefixes, the originating routerthat originated these prefixes oris identified by theERLD capabilitiesadvertising Router ID field of thedestination. Therefore, it is necessary to advertisearea-scoped LSA used for those prefix advertisements. However, for theoriginator of theseinter-area prefixesto ensureadvertised by theingress LSR can constructArea Border Router (ABR), theappropriate label stack. More generally, [RFC8476] defines a mechanism to advertise multiple typesadvertising Router ID field ofsupported Maximum SID Depths (MSD) at node and/or link granularity. Thistheir area-scoped LSAs is set to the ABR itself and the informationwill be referred whenabout thehead-endrouterstarts to send traffic to destination prefixes. In inter-area scenario, itoriginating the prefix advertisement isalso necessarylost in this process of prefix propagation across areas. For Autonomous System (AS) external prefixes, the originating router may be considered as the Autonomous System Border Router (ASBR) and is identified by the advertising Router ID field of the AS-scoped LSA used. However, the actual originating router for thesender to learnprefix may be a remote router outside thecapabilitiesOSPF domain. Similarly, when an ABR performs translation of Not-So-Stubby Area (NSSA) [RFC3101] LSAs to AS-external LSAs, thereceiversinformation associated with theinter-area prefixes. ThereNSSA ASBR (or the router outside the OSPF domain) isanother scenario where knowingnot conveyed across the OSPF domain. While typically the originator ofinter-area prefixes is useful. For example, Border Gateway Protocol Link-State (BGP-LS) [RFC7752] describes mechanisms using the BGP protocol to advertise Link-State information. Thisinformationcan enable a Software Definition Network (SDN) controller to automatically determine the underlay network topology. However, if the underlay networkin OSPF ispartitioned into multiple areas and running theidentified by its OSPFprotocol,Router ID, itisdoes noteasynecessarily represent a reachable address for theSDN controllerrouter. The IPv4/IPv6 Router Address as defined in [RFC3630] and [RFC5329] for OSPFv2 and OSPFv3 respectively provide an address torebuild the multi-area topology since ABRreach thatconnects multiple areas will normally hide the detailed topologyrouter. The primary use case forthese non-backbone areas. If only the internal routers within backbone area run the BGP-LS protocol, they just learn and reportthesummary network information from the non-backbone areas. If the SDN controller can learnextensions proposed in this document is to be able to identify the originator of theinter-area prefixes,prefix in the network. In cases where multiple prefixes are advertised by a given router, it ispossible to rebuild the inter-area topology. [RFC7794] introduces the Intermediate Systemalso useful toIntermediate System (IS-IS) "IPv4/IPv6 Source Router IDs" Type-Length-Value (TLV)be able toadvertise the source ofassociate all these prefixesleaked fromwith adifferent IS-IS level. This TLV can be used insingle router even when prefixes are advertised outside of theabove scenarios. Such solution can also be appliedarea innetworks that runwhich they originated. It also helps to determine when theOSPF protocol, but existing OSPF LSAs TLVs must be extendedsame prefix is being originated by multiple routers across areas. This document proposes extensions toincludethe OSPF protocol for inclusion of information associated with the router originating theprefix. This draft provides such solutionprefix along with the prefix advertisement. These extensions do not change the core OSPF route computation functionality. They provide useful information for topology analysis and traffic engineering, especially on a controller when this information is advertised as an attribute of theOSPFv2 [RFC2328]prefixes via mechanisms such as Border Gateway Protocol Link- State (BGP-LS) [RFC7752]. Applications related to use of the prefix originating node information for topology reconstruction process on a controller andOSPFv3 [RFC5340] protocols. 2. Conventions usedthe associated limitations are described inthis documentAppendix A and Appendix B. 1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.3. Terminology The following terms are used in this document: o ABR: Area Border Router o ASBR: Autonomous System Border Router o ERLD: Entropy Readable Label Depth o EL: Entropy Label o IS-IS: Intermediate System to Intermediate System o LSA: Link-State Advertisement o MSD: Maximum SID Depths o NLRI: Network Layer Reachability Information o OSPF: Open Shortest Path First o SID: Segment IDentifier o SDN: Software Definition Network 4. Inter-Area Prefix Source Advertisement Use Cases Figure 1 illustrates a topology where OSPF is running in multiple areas. R0-R4 are routers in the backbone area, S1-S4 are internal routers in area 1, and T1-T4 are internal routers in area2.R1 and R3 are ABRs between area 0 and area 1. R2 and R4 are ABRs between area 0 and area 2. N1 is the network between router S1 and S2 and N2 is the network between router T1 and T2. Ls1 isProtocol Extensions This document defines theloopback address of Node S1Prefix Source Router-ID andLt1 istheloopback address of Node T1. +-----------------+ |IP SDN Controller| +--------+--------+ | | BGP-LS | +---------------------+------+--------+-----+--------------+ | +--+ +--+ ++-+ ++-+ +-++ + -+ +--+| | |S1+--------+S2+---+R1+---|R0+----+R2+---+T1+--------+T2|| | +-++ N1 +-++ ++-+ +--+ +-++ ++++ N2 +-++| | | | | | || | | | | | | | || | | | +-++ +-++ ++-+ +-++ ++++ +-++| | |S4+--------+S3+---+R3+-----------+R4+---+T3+--------+T4|| | +--+ +--+ ++-+ +-++ ++-+ +--+| | | | | | | | | | Area 1 | Area 0 | Area 2 | +---------------------+---------------+--------------------+ Figure 1: OSPF Inter-AreaPrefix OriginatorScenario If S1 wants to send traffic to prefix Lt1 that is connected to T1 in another area, it should know the ERLD and MSD values associated with the node T1, and then construct the right label stack at the ingress nodeSub-TLVs fortraffic destined to prefix Lt1. In another scenario, If R0 has some method to learn the originatorinclusion ofnetwork N1the Router ID andreports sucha reachable address informationto IP SDN controller, then it is possiblefor thecontroller to reconstruct the topology inrouter originating thenon-backbone areas. The topology reconstruction process and its limitations are described inprefix as a prefix attribute. 2.1. Prefix Source Router-ID Sub-TLV For OSPFv2, theAppendix A and Appendix B. 5. ExternalPrefix SourceAdvertisement Use Cases Figure 2 illustrates a topology where OSPF is running in different domain thatRouter-ID Sub-TLV isconnected byanAutonomous System Border Router (ASBR). A, B, and C are routers in the Domain 1; C, D, and E are routers in Domain 2. Router C isoptional Sub- TLV of theASBR betweenOSPFv2 Extended Prefix TLV [RFC7684]. For OSPFv3, thetwo domains. When router E receives an external prefix, it will redistribute it asPrefix Source Router-ID Sub-TLV is anAS-External LSA within domain 2. When C receives such LSA,optional Sub-TLV of theoriginator information for such external prefix will be lostIntra- Area-Prefix TLV, Inter-Area-Prefix TLV, and External-Prefix TLV [RFC8362] whenit encodes theoriginating either an IPv4 [RFC5838] or an IPv6 prefixinformation with the current LSA format field. In some situations, it will be helpful if C can advertise such originator information. +-------------------------------------------------------------------+ | | Externaladvertisement. The Prefix Source Router-ID Sub-TLV has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type |+---+ +---+ +---+ +---+ +-|-+ | | | A +-------+ B +----------| C +---------+ D +---------+ E |------| | +---+ +---+ +---+ +---+ +---+ |Length |Domain 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Domain 2OSPF Router ID |+-------------------------------------------------------------------++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure2: OSPF External1: PrefixOriginator Scenario FromSource Router-ID Sub-TLV Format Where: o Type: 4 for OSPFv2 and 27 for OSPFv3 o Length: 4 o OSPF Router ID : theabove scenarios, we can concludeOSPF Router ID of the OSPF router thatit is useful to defineoriginated the prefix advertisement in the OSPF domain. A prefixoriginator sub TLV . 6.advertisement MAY include more than one Prefix Source Router-IDsub-TLV [RFC7684] and [RFC8362] respectively define TLV-based LSAs for OSPFv2 and OSPFv3. These documents facilitate additionsub-TLV, one corresponding to each ofnew attributes for prefixes and providethebasis for a sub-TLV to advertiseEqual-Cost Multi- Path (ECMP) nodes that originated the"Prefixgiven prefix. A received Prefix Source Router-ID Sub-TLV with OSPF RouterID".ID set to 0 MUST be considered invalid and ignored. Additionally, reception of such Sub-TLV SHOULD be logged as an error (subject to rate-limiting). 2.2. Prefix Originator Sub-TLV For OSPFv2,this sub-TLVthe Prefix Originator Sub-TLV isa sub-TLVan optional Sub-TLV of the OSPFv2 Extended Prefix TLVwhich SHOULD be included in the "OSPFv2 Extended Prefix Opaque LSA" [RFC7684] for inter-area prefixes.[RFC7684]. For OSPFv3,this sub-TLVthe Prefix Originator Sub-TLV isa sub-TLVan optional Sub-TLV of"Inter-Area-Prefix TLV", which SHOULD be included inthe"E-Inter-Area-Prefix-LSA" [RFC8362].Intra-Area-Prefix TLV, Inter-Area-Prefix TLV, and External-Prefix TLV [RFC8362] when originating either an IPv4 [RFC5838] or an IPv6 prefix advertisement. The"Prefix Source Router-ID" sub-TLVPrefix Originator Sub-TLV has the following format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Prefix Source Router-IDRouter Address (4 or 16 octects) |+---------------------------------------------------------------++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure3:2: PrefixSource Router-ID sub-TLVOriginator Sub-TLV Format Where: oSource Router-ID Sub-TLVType:4 (IANA TEMPORARY allocation) [RFC7684] or 27 (IANA TEMPORARY allocation) [RFC8362]TBD1 for OSPFv2 and TBD2 for OSPFv3 o Length: 4 or 16 oValue: Router-ID of OSPFv2/OSPFv3Router Address: A reachable IPv4 or IPv6 router address for the router thatisoriginated thesourceIPv4 or IPv6 prefix advertisement. Such an address would be semantically equivalent to what may be advertised in the OSPFv2 Router Address TLV [RFC3630] or in the OSPFv3 Router IPv6 Address TLV [RFC5329]. A prefix advertisement MAY include more than one Prefix Originator sub-TLV, one corresponding to each of the Equal-Cost Multi-Path (ECMP) nodes that originated the given prefix.This sub-TLV providesA received Prefix Originator Sub-TLV that has an invalid length (not 4 or 16) or a Reachable Address containing an invalid IPv4 or IPv6 address (dependent on address family of thesame functionalityassociated prefix) MUST be considered invalid and ignored. Additionally, reception of such Sub-TLV SHOULD be logged as an error (subject to rate-limiting). [RFC7794] provides similar functionality for theIS-IS "IPv4/IPv6 Source Router" TLV defined in [RFC7794]. 7.Intermediate System to Intermediate System (IS-IS) protocol. 3. Elements of ProcedureThe following sections describeThis section describes the procedureto include the newly defined "Source Router-ID Sub-TLV" in the related LSAforinter-area prefixes and external prefixes respectively. 7.1. Inter-Area Prefixes When an ABR, for example R2 in Figure 1, receives a Router-LSAadvertisementin area 2, it SHOULD originateof thecorresponding "OSPFv2 ExtendedPrefixOpaque LSA" for OSPFv2 or "E-Inter-Area- Prefix-LSA" for OSPFv3 that includes theSource Router-IDsub-TLV forand Prefix Originator Sub-TLVs along with thenetwork prefixes. For example,prefix advertisement. The OSPF Router ID of the Prefix Source Router-ID is set toidentifythesource routerOSPF Router ID of the node originating the prefixLt1 and other inter-area prefixesinFigure 1. When a router in another area, e.g., S1, receives such LSA, itthe OSPF domain. If the originating node is advertising an OSPFv2 Router Address TLV [RFC3630] or an OSPFv3 Router IPv6 Address TLV [RFC5329], thencan ascertainthatprefix Lt1value isassociated with node T1 and obtainset in theERLD or MSD value from T1's Router-Information LSA [RFC7770] and constructRouter Address field of theright label stack atPrefix Originator Sub-TLV. When theingressorignating nodeS1is not advertising such an address, implementations MAY support mechanisms to determine a reachable address belonging to the originating node to set in the Router Address field. Such mechanisms are outside the scope of this document. Implementations MAY support the selection of specific prefixes fortraffic destinedwhich the originating node information needs to be included with their prefixLt1.advertisements. Whena router in anotheran ABR generates inter-area prefix advertisements into its non- backbone areas corresponding to an inter-area prefix advertisement from the backbone area,e.g., R0, receives such LSA, it learnsthe only way to determine the originating node information is based on the Prefix SourceRouter-idRouter-ID andincludes itPrefix Originator Sub-TLVs present in the inter-area prefixinformation advertised toadvertisement originated into the backbone area by anSDN controller as described in [I-D.ietf-idr-bgp-ls-segment-routing-ext].ABR for another non-backbone area. TheSDN controller can then use such informationABR performs its prefix calculation tobuilddetermine theinter-area topology accordingset of nodes that contribute to theprocess described in the Appendix A. The topology retrieval process may not suitable for some environments as stated in Appendix B. 7.2. External Prefixes When an ASBR, for example C in Figure 2, receives an AS-External LSA for an externalbest prefixin domain 2, it SHOULD extractreachability. It MUST use the prefix originator information only from this set of nodes. The ABR MUST NOT include the"Advertising Router" field fromPrefix Source Router-ID or theLSA header. WhenPrefix Originator Sub-TLVs when it is unable to determine the information of the best originating node. Implementations MAY provide control on ABRs to selectively disable the propagation of the originating node information across area boundaries. Implementations MAY support the propagation of the originating node information along with a redistributed prefixis advertisedinto the OSPF domain1 as an AS-External LSA, router C mayfrom another routing domain. The details of such mechanisms are outside the scope of this document. Such implementations MAY alsoadvertiseprovide control on whether the Router Address in theSource Router-ID using a AS-scoped OSPFv2 ExtendedPrefixOpaque LSAOriginator Sub-TLV is set as the ABSR node address or asa Sub-TLV intheOSPFv3 AS- External LSA. 8.address of the actual node outside the OSPF domain that owns the prefix. When translating the NSSA prefix advertisements [RFC3101] to the AS external prefix advertisements, the NSSA ABR, follows the same procedures as an ABR generating inter-area prefix advertisements for the propagation of the originating node information. 4. Security Considerations Since this document extends the"OSPFv2OSPFv2 Extended PrefixLSA" and "OSPFv3 E-Inter-Area-Prefix LSA",LSA, the security considerations for [RFC7684]and [RFC8362]are applicable.Modification of the "Prefix Source Sub-TLV" could be used for a Denial-of-Service attack and could inhibit the use cases described in Section 4. IfSimilarly, since this document extends theOSPF domain is vulnerable to such attacks, OSPF authentication should be used as defined for OSPFv2 in [RFC5709] and [RFC7474] and forOSPFv3in [RFC7166]. Additionally, advertisement of the prefix source for inter-area prefixes facilitates reconstruction ofE-Intra-Area-Prefix-LSA, E- Inter-Area-Prefix-LSA, E-AS-External LSA and E-NSSA-LSA, theOSPF topology for other areas. Network operators may consider their topologies to be sensitive confidential data. For OSPFv3, IPsec can be used to provide confidentiality [RFC4552]. Since there is no standard definedsecurity considerations fornative OSPFv2 IPsec, some form of secure tunnel is required to provide confidentiality. 9.[RFC8362] are applicable. 5. IANA Considerations Thisspecification definesdocument requests IANA for thePrefix Source Router-ID sub-TLV as described in Section 6. This value should be added toallocation of theboth existing "OSPFv2 Extended Prefix TLV Sub-TLVs" and "OSPFv3 Extended- LSA Sub-TLVs" registries. The following sub-TLV is added tocodepoint from the "OSPFv2 Extended Prefix TLV Sub-TLVs" registry under the "Open Shortest Path First v2 (OSPFv2) Parameters" registry.The allocation policy is IETF Review as defined in [RFC7684] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CodePoint| Description | IANA Allocation | | Point | | Status |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 4 | Prefix Source Router-ID Sub-TLV |Allocation from IANAearly allocation done | | TBD1 |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Prefix Originator Sub-TLV | pending | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure4:3: CodePointPoints in"OSPFv2OSPFv2 Extended Prefix TLVSub-TLVs" The following sub-TLV is added toSub-TLVs This document requests IANA for the allocation of the codepoint from the "OSPFv3Extended-LSAExtended Prefix TLV Sub-TLVs" registry under the "Open Shortest Path First v3 (OSPFv3) Parameters" registry.The allocation policy is IETF Review as defined in [RFC8362] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CodePoint| Description | IANA Allocation | | Point | | Status |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 27 | Prefix Source Router-ID Sub-TLV |Allocation from IANAearly allocation done | | TBD2 |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Prefix Originator Sub-TLV | pending | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure5:4: CodePointPoints in"OSPFv3OSPFv3 Extended-LSASub-TLVs" 10.Sub-TLVs 6. Acknowledgement Many thanks to Les Ginsberg for his suggestions on this draft. Also thanks to Jeff Tantsura, Rob Shakir, Gunter Van De Velde, Goethals Dirk, Smita Selot, Shaofu Peng, and John E Drake for their valuable comments.11.7. References11.1.7.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328, DOI 10.17487/RFC2328, April 1998, <https://www.rfc-editor.org/info/rfc2328>.[RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality for OSPFv3",[RFC3101] Murphy, P., "The OSPF Not-So-Stubby Area (NSSA) Option", RFC4552,3101, DOI10.17487/RFC4552, June 2006, <https://www.rfc-editor.org/info/rfc4552>.10.17487/RFC3101, January 2003, <https://www.rfc-editor.org/info/rfc3101>. [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008, <https://www.rfc-editor.org/info/rfc5340>.[RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M., Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic Authentication", RFC 5709, DOI 10.17487/RFC5709, October 2009, <https://www.rfc-editor.org/info/rfc5709>. [RFC7166] Bhatia, M., Manral, V., and A. Lindem, "Supporting Authentication Trailer for OSPFv3", RFC 7166, DOI 10.17487/RFC7166, March 2014, <https://www.rfc-editor.org/info/rfc7166>. [RFC7474] Bhatia, M., Hartman, S., Zhang, D., and A. Lindem, Ed., "Security Extension for OSPFv2 When Using Manual Key Management", RFC 7474, DOI 10.17487/RFC7474, April 2015, <https://www.rfc-editor.org/info/rfc7474>.[RFC7684] Psenak, P., Gredler, H., Shakir, R., Henderickx, W., Tantsura, J., and A. Lindem, "OSPFv2 Prefix/Link Attribute Advertisement", RFC 7684, DOI 10.17487/RFC7684, November 2015, <https://www.rfc-editor.org/info/rfc7684>.[RFC7770] Lindem, A., Ed., Shen, N., Vasseur, JP., Aggarwal, R., and S. Shaffer, "Extensions to OSPF for Advertising Optional Router Capabilities", RFC 7770, DOI 10.17487/RFC7770, February 2016, <https://www.rfc-editor.org/info/rfc7770>.[RFC7794] Ginsberg, L., Ed., Decraene, B., Previdi, S., Xu, X., and U. Chunduri, "IS-IS Prefix Attributes for Extended IPv4 and IPv6 Reachability", RFC 7794, DOI 10.17487/RFC7794, March 2016, <https://www.rfc-editor.org/info/rfc7794>. [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. [RFC8362] Lindem, A., Roy, A., Goethals, D., Reddy Vallem, V., and F. Baker, "OSPFv3 Link State Advertisement (LSA) Extensibility", RFC 8362, DOI 10.17487/RFC8362, April 2018, <https://www.rfc-editor.org/info/rfc8362>.[RFC8476] Tantsura, J., Chunduri, U., Aldrin, S.,7.2. Informative References [RFC3630] Katz, D., Kompella, K., andP. Psenak, "Signaling Maximum SID Depth (MSD) Using OSPF",D. Yeung, "Traffic Engineering (TE) Extensions to OSPF Version 2", RFC8476,3630, DOI10.17487/RFC8476, December 2018, <https://www.rfc-editor.org/info/rfc8476>. 11.2. Informative References [I-D.ietf-idr-bgp-ls-segment-routing-ext] Previdi, S., Talaulikar,10.17487/RFC3630, September 2003, <https://www.rfc-editor.org/info/rfc3630>. [RFC5329] Ishiguro, K.,Filsfils, C., Gredler, H.,Manral, V., Davey, A., andM. Chen, "BGP Link-State extensions for Segment Routing", draft-ietf-idr-bgp-ls-segment-routing-ext-16 (work in progress), June 2019. [I-D.ietf-ospf-mpls-elc] Xu, X., Kini, S., Psenak, P., Filsfils, C., Litkowski,A. Lindem, Ed., "Traffic Engineering Extensions to OSPF Version 3", RFC 5329, DOI 10.17487/RFC5329, September 2008, <https://www.rfc-editor.org/info/rfc5329>. [RFC5838] Lindem, A., Ed., Mirtorabi, S., Roy, A., Barnes, M., andM. Bocci, "Signaling Entropy Label Capability and Entropy Readable Label-stack Depth Using OSPF", draft- ietf-ospf-mpls-elc-12 (work in progress), October 2019.R. Aggarwal, "Support of Address Families in OSPFv3", RFC 5838, DOI 10.17487/RFC5838, April 2010, <https://www.rfc-editor.org/info/rfc5838>. [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and S. Ray, "North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP", RFC 7752, DOI 10.17487/RFC7752, March 2016, <https://www.rfc-editor.org/info/rfc7752>. Appendix A. Inter-Area Topology Retrieval Process When an IP SDN Controller receives BGP-LS [RFC7752] information, it should compare the prefix Network Layer Reachability Information (NLRI) that is included in the BGP-LS NLRI. When it encounters the same prefix but with different source router ID, it should extract the corresponding area-ID, rebuild the link between these two source routers in the non-backbone area. Below is one example that based on the Figure1:5 which illustrates a topology where OSPF is running in multiple areas. +-----------------+ |IP SDN Controller| +--------+--------+ | | BGP-LS | +---------------------+------+--------+-----+--------------+ | +--+ +--+ ++-+ ++-+ +-++ + -+ +--+| | |S1+--------+S2+---+R1+---|R0+----+R2+---+T1+--------+T2|| | +-++ N1 +-++ ++-+ +--+ +-++ ++++ N2 +-++| | | | | | || | | | | | | | || | | | +-++ +-++ ++-+ +-++ ++++ +-++| | |S4+--------+S3+---+R3+-----------+R4+---+T3+--------+T4|| | +--+ +--+ ++-+ +-++ ++-+ +--+| | | | | | | | | | Area 1 | Area 0 | Area 2 | +---------------------+---------------+--------------------+ Figure 5: OSPF Inter-Area Prefix Originator Scenario R0-R4 are routers in the backbone area, S1-S4 are internal routers in area 1, and T1-T4 are internal routers in area 2. R1 and R3 are ABRs between area 0 and area 1. R2 and R4 are ABRs between area 0 and area 2. N1 is the network between router S1 and S2 and N2 is the network between router T1 and T2. Ls1 is the loopback address of Node S1 and Lt1 is the loopback address of Node T1. Assuming we want to rebuild the connection between router S1 and router S2 located in area 1: a. Normally, router S1 will advertise prefix N1 within its router- LSA. b. When this router-LSA reaches the ABR router R1, it will convert it into summary-LSA, add thePrefixSource Router-IDsub-TLV, which is router id of S1Sub-TLV and the Prefix Originator Sub-TLV, as described inthis example.Section 3. c. R1 then floods this extension summary-LSA to R0, which is using the BGP-LS protocol with IP SDN Controller. The controller then knows the prefix for N1 is from S1. d. Router S2 will perform a similar process, and the controller will also learn that prefix N1 is also from S2. e. Then it can reconstruct the link between S1 and S2, using the prefix N1. The topology within Area 1 can then be reconstructed accordingly. Iterating the above process continuously, the IP SDN controller can retrieve a detailed topology that spans multiple areas. Appendix B. Special Considerations on Inter-Area Topology Retrieval The above topology retrieval process can be applied in the case where each point-to-point or multi-access link connecting routers is assigned a unique prefix. However, there are some situations where this heuristic cannot be applied. Specifically, the cases where the link is unnumbered or the prefix corresponding to the link is an anycast prefix. The Appendix A heuristic to rebuild the topology can normally be used if all links are numbered. For anycast prefixes, if it corresponds to the loopback interface and has a host prefix length, i.e., 32 for IPv4 prefixes and 128 for IPv6 prefixes, Appendix A can also applied since these anycast prefixes are not required to reconstruct the topology. Authors' Addresses Aijun Wang China Telecom Beiqijia Town, Changping District Beijing 102209 China Email: wangaj3@chinatelecom.cn Acee Lindem Cisco Systems 301 Midenhall Way Cary, NC 27513 USA Email: acee@cisco.com Jie Dong Huawei Technologies Beijing China Email: jie.dong@huawei.com Peter Psenak Cisco Systems Pribinova Street 10 Bratislava, Eurovea Centre, Central 3 81109 Slovakia Email: ppsenak@cisco.com Ketan Talaulikar Cisco SystemsS.No. 154/6, Phase I, Hinjawadi Pune 411 057India Email: ketant@cisco.com