Network Working Group K. Kompella Internet-DraftJuniper NetworksJ. Drake Updates: 3031 (if approved)S. AmanteJuniper Networks Intended status: Standards Track S. Amante Expires: September 7, 2011 Level 3 Communications, LLCExpires: January 13,W. Henderickx Alcatel-Lucent L. Yong Huawei USA March 6, 2011July 12, 2010The Use of Entropy Labels in MPLS Forwardingdraft-kompella-mpls-entropy-label-01draft-kompella-mpls-entropy-label-02 Abstract Load balancing is a powerful tool for engineering traffic across a network. This memo suggests ways of improving load balancing across MPLS networks using thenotionconcept of "entropy labels". It defines the concept, describes whytheyentropy labels areneeded, suggests how they can be used, anduseful, enumerates properties of entropy labels that allowoptimal benefit.maximal benefit, and shows how they can be signaled and used for various applications. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onJanuary 13,September 7, 2011. Copyright Notice Copyright (c)20102011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.MotivationConventions used . . . . . . . . . . . . . . . . . . . . . 4 1.2. Motivation . . .4 1.2. Conventions used. . . . . . . . . . . . . . . . . . . . .65 2. Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. Entropy Labels . . . . . . . . . . . . . . . . . . . . . . . . 7 4.Forwarding and Load Balancing Behaviors forData Plane Processing of Entropy Labels . .7. . . . . . . . . 8 4.1. Ingress LSR . . . . . . . . . . . . . . . . . . . . . . .78 4.2. Transit LSR . . . . . . . . . . . . . . . . . . . . . . .89 4.3. EgressLSRsLSR . . . . . . . . . . . . . . . . . . . . . . .8. 9 5. Signaling for Entropy Labels . . . . . . . . . . . . . . . . . 9 5.1. LDP Signaling . . . . . . . . . . . . . . . . . . . . . .9 5.1.1. Structure of Entropy Label sub-TLV10 5.2. BGP Signaling . . . . . . . . . .10 5.2. RSVP. . . . . . . . . . . . 11 5.3. RSVP-TE Signaling . . . . . . . . . . . . . . . . . . . . 12 6. Operations, Administration, and Maintenance (OAM) and Entropy Labels . .11 5.3. BGP Signaling. . . . . . . . . . . . . . . . . . . . . .11 6.13 7. MPLS-TP and Entropy Labels . . . . . . . . . . . . . . . . . .11 7.14 8. Point-to-Multipoint LSPs and Entropy Labels . . . . . . . . . 15 9. Entropy Labels and Applications . . . . . . . . . . . . . . . 15 9.1. Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . 15 9.2. LDP Pseudowires . . . . . . . . . . . . . . . . . . . . . 17 9.3. BGP Applications . . . . . . . . . . . . . . . . . . . . . 18 9.3.1. Inter-AS BGP VPNs . . . . . . . . . . . . . . . . . . 19 9.4. Multiple Applications . . . . . . . . . . . . . . . . . . 20 10. Security Considerations . . . . . . . . . . . . . . . . . . .11 8.21 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .11 9.22 11.1. LDP Entropy Label TLV . . . . . . . . . . . . . . . . . . 22 11.2. BGP Entropy Label Attribute . . . . . . . . . . . . . . . 22 11.3. Attribute Flags for LSP_Attributes Object . . . . . . . . 22 11.4. Attributes TLV for LSP_Attributes Object . . . . . . . . . 22 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .12 10.23 13. References . . . . . . . . . . . . . . . . . . . . . . . . . .12 10.1.23 13.1. Normative References . . . . . . . . . . . . . . . . . . .12 10.2.23 13.2. Informative References . . . . . . . . . . . . . . . . . .1223 Appendix A. Applicability of LDP Entropy Label sub-TLV . . . . .1224 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .1325 1. Introduction Load balancing, or multi-pathing, is an attempt to balance traffic across a network by allowing the traffic to useseveral paths, not just a single shortest path.multiple paths. Load balancing has several benefits: it eases capacity planning; it can help absorb traffic surges by spreading them acrossseveral links;multiple paths; itallowallows better resilience by offering alternate pathsshouldin the event of a link or nodefail.failure. As providers scale their networks, theyresort to a small number ofuse several techniques to achieve greater bandwidth betweennodes and, subsequently, depend on load-balancing of traffic over those paths.nodes. Two widely used techniques are: Link Aggregation Group (LAG) and Equal-Cost Multi-Path (ECMP). LAG isonlyused to bond together several physical circuits between two adjacent nodes so they appear to higher-layer protocols as a single, higher bandwidth"virtual"'virtual' pipe.On the other hand,ECMP is used between twonodes,nodes separated by one or more hops, to allowload-sharingload balancing overmore than just theseveral shortestpathpaths in thenetwork -- thisnetwork. This is typically obtained by arranging IGP metrics such that there are several equal cost paths betweensource- destinationsource-destination pairs.In summary, bothBoth of these techniques may, andoftentimesoften do, co-exist in various parts of a givenprovidersprovider's network, depending on various choices made by the provider. A very importantconsiderationrequirement when load balancing is that packets belonging to a given"flow" MUST'flow' must be mapped to the same path, i.e., the same exact sequence of links across the network. This is to avoid jitter, latency and re-ordering issues for the flow.However, whatWhat constitutes a flow varies considerably. A common example of a flow is a TCP session. Other examples are an L2TPsessionssession corresponding to a given broadbandusers,user, or traffic within an ATM virtual circuit.A flow is usually defined, for the purposes of forwarding andTo meet this requirement, a node uses certain fields, termed 'keys', within a packet's header as input to a loadbalancing, bybalancing function (typically a hashcomputed on packet headers suchfunction) that selects the path for all packetsbelonging toin a givenflow map to the same hash value.flow. Thefieldskeys chosen forsuch a hashthe load balancing function depend on the packet type; a typical set (for IP packets) is the IP source and destinationaddress,addresses, the protocol type, and (for TCP and UDP traffic) the source and destination port numbers.AAn overly conservative choice of fieldsleadsmay lead to many flows mapping to the same hash value (and consequentlypoorpoorer load balancing); an overly aggressive choice may map a flow to multiple values, potentiallycausingviolating theissues mentioned above.above requirement. For MPLS networks, most of the same principles (and benefits) apply. However, finding usefulfieldskeys in a packet for the purpose of load balancing can be more of a challenge. In many cases,the extraMPLS encapsulation may require fairly deep inspection of packets to find thesefieldskeys atevery hop. An idea for removingtransit LSRs. One way to eliminate the need for this deep inspection is toextract this information *once*, athave the ingress LSR of an MPLS Label Switched Path(LSP),extract the appropriate keys from a given packet, input them to its load balancing function, andencode, withinplace thelabel stack itself,result inaddition toan additional label, termed theforwarding semantics'entropy label', as part of the MPLS labelstack, the load balancing information. This informationstack it pushes onto that packet. The packet's MPLS entire label stack can then be usedon all MPLS hops acrossby transit LSRs to perform load balancing, as thenetwork.entropy label introduces the right level of "entropy" into the label stack. There arethreefour key reasons why this is beneficial: 1. at the ingressof the LSP,LSR, MPLS encapsulation hasn't yet occurred, so deep inspection is not necessary; 2. the ingressof an LSPLSR has more context and information about incoming packets than transitnodes; andLSRs; 3. ingressnodesLSRs usually operate at lower bandwidths than transitnodes,LSRs, allowing them to do more work perpacket. This memo describes a few approachespacket, and 4. transit LSRs do not need tosolving this problem,perform deep packet inspection andfocuses on one method, which uses the notion of entropy labels.can load balance effectively using only a packet's MPLS label stack. This memogoes on to define entropy labels, anddescribes whytheyentropy labels areneeded,needed and defines the properties of entropylabelslabels; inthe forwarding plane:particular how they are generated andreceivedreceived, andwhat isthe expected behavior of transitLabel Switching Routers (LSRs).LSRs. Finally, it describes in general how signaling works and what needs to be signaled, as well as specifics forLDP.the signaling of entropy labels for LDP ([RFC5036]), BGP ([RFC3107], [RFC4364]), and RSVP-TE ([RFC3209]). 1.1. Conventions used The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. The following acronyms are used: LSR: Label Switching Router; LER: Label Edge Router; PE: Provider Edge router; CE: Customer Edge device; and FEC: Forwarding Equivalence Class. The term ingress (or egress) LSR is used interchangeably with ingress (or egress) LER. The term application throughout the text refers to an MPLS application (such as a VPN or VPLS). A label stack (say of three labels) is denoted by <L1, L2, L3>, where L1 is the "outermost" label and L3 the innermost (closest to the payload). Packet flows are depicted left to right, and signaling is shown right to left (unless otherwise indicated). The term 'label' is used both for the entire 32-bit label and the 20- bit label field within a label. It should be clear from the context which is meant. 1.2. Motivation MPLS is very successful generic forwarding substrate thatmay transporttransports several dozen types of protocols, most notably: IP, PWE3, VPLS and IPVPN's.VPNs. Within each type of protocol, there typically exist severalvariants as it relates to load-sharing, e.g.:variants, each with a different set of load balancing keys, e.g., for IP: IPv4, IPv6, IPv6 in IPv4, etc.; for PWE3: Ethernet, ATM,Frame-Relay,Frame- Relay, etc. There are also several different types of Ethernet over PW encapsulation, ATM over PW encapsulation, etc. as well. Finally, given the popularity of MPLS, it is likely that it will continue to be extended to transport newprotocols as the need arises.protocols. Currently, eachMPLStransit LSR along the path of a givenpath needsLSP has to try toindividuallyinfer the underlying protocol withinaan MPLS packet in order tothenextract appropriate keysfrom the payload. Those keys are then used as input into a hash algorithm to determine the specific output interface on a LSR that is usedforthat given "microflow".load balancing. Unfortunately, if theMPLStransit LSR is unable to infer the MPLS packet'spayloadprotocol (as is often the case),they typicallyit willresort to usingtypically use the topmost (or all) MPLS labels in theMPLSlabel stack as keystofor theload-hashing algorithm.load balancing function. The resultismay be an extremely inequitable distribution of traffic acrossmultipleequal-cost paths exiting thatnode, simplyLSR. This is becausethe topmostMPLS labels areverygenerally fairly coarse-grained forwarding labels that typically describe a next-hop, or provide someother typeofmux/demuxdemultiplexing and/or forwarding function, and do not describe thegranularity of thepacket's underlyingtraffic.protocol. On the other hand, an ingressMPLS LER's (PE routers) haveLSR (e.g., a PE router) has detailed knowledge of anMPLSpacket's contents, typically through a priori configuration of the encapsulation(s) that are expected at a given PE-CE interface,(e.g.:(e.g., IPv4, IPv6, VPLS, etc.). They also have more flexible forwarding hardware. PE routers need this information and these capabilities to: a) apply the required services for the CE; b) discern the packet's CoS forwardingtreatment, b)treatment; c) apply filters to forward or block traffic to/from the CE;c)d) to forward routing/control traffic to an onboard management processor;or, d) load-shareand, e) load-balance the traffic on its uplinks to transit LSRs (e.g., Prouters.routers). By knowing the expected encapsulation types, an ingressPELSR routercouldcan apply asmaller subsetmore specific set of payload parsing routines to extract the keys appropriate forthea given protocol.Ultimately, this should allowThis allows for significantly improved accuracy in determining the appropriateload-balancingload balancing behavior for each protocol.In addition, compared to MPLS LSR's, PE routers typically operate at lower forwarding rates as well as have more flexible forwarding hardware. As a result, a PE router can typically adapt much more quicklyIf the ingress LSR were tonew/emerging protocols and determinecapture theappropriate keys usedflow information so gathered in a convenient form forload-sharing traffic that type of traffic through the network. An additional advantage of applying entropy labels only at the edge of the network, on PE routers, would be that core/transit MPLS LSR'sdownstream transit LSRs, transit LSRs couldonce again return to beingremain completely oblivious to the contents of each MPLS packet, andonlyuse only theouter MPLS labelscaptured flow information todetermine forwarding and forwarding treatment of MPLS packets. Specifically,perform load balancing. In particular, there will be no reason toduplicate, from MPLS LER's, extremelyduplicate an ingress LSR's complex packet/payload parsing functionalitywithin MPLS LSR's and attempt to keep to keep this functionality at parity across all network elements, e.g.: both MPLS LSR's and LER's. Ultimately, this shouldin a transit LSR. This will result in lesscomplexity within core LSR's allowingcomplex transit LSRs, enabling them to more easily scale to higher forwarding rates, larger port density,consume less power,lower power consumption, etc.Finally, the approach discussedThe idea in this memowould allow for more rapid deployment of new protocols, since MPLS LSR's will not have to be developed or modified to understand how to properly extract keysis toachieve good load-sharing of traffic throughoutcapture this flow information as a label, thenetwork. In summary, MPLS LSR's are ill-equippedso-called entropy label. Ingress LSRs can also adapt more readily toinfer the protocol within a packet's payloadnew protocols andchooseextract the appropriate keyswithin the payload to correctly identify a given "microflow", which is required to provide the most equitable load-sharing over multiple equal cost paths. On the other hand, PE routers have both the knowledge and capabilitiestomore accurately determine the load-sharing treatmentuse for load balancing packets of those protocols. This means thatshould be applied to a given protocol encapsulated within MPLS by MPLS LSR's. 1.2. Conventions used The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"deploying new protocols or services inthis document are to be interpreted as describededge devices requires fewer concommitant changes in[RFC2119]. Labels stacks are denoted <L1, L2, L3>, which L1 isthe"outermost" labelcore, resulting in higher edge service velocity andL3 the innermost (closest toat thepayload). Packet flows are depicted left to right, and signaling is shown right to left (unless otherwise indicated).same time more stable core networks. 2. Approaches There are two main approaches to encoding load balancing information in the label stack. The first allocates multiple labels for a particular Forwarding Equivalance Class (FEC). These labels are equivalent in terms of forwarding semantics, but havingseveralmultiple labels allows flexibility in assigning labels to flowsfrombelonging to the same FEC.The other approach encodes the load balancing information as a separate label in the label stack. Here, there are two sub- approaches, based on whether this load-balancing label is signaled or not. The firstThis approach has the advantage that the label stackstayshas the same depth whetherusingor not one uses label-based loadbalancing or not;balancing; and so, consequently,dothere is no change to forwarding operations on transit and egress LSRs. However, it has a major drawback in that there is a significant increase in both signaling and forwardingstate are both increased significantly.state. Thenumber of independent choices for load balancing packets belonging to a FEC limitsother approach encodes theeffectiveness ofloadbalancing, so one would like this number to be large. However, the larger this number is, the greater the signaling and forwarding statebalancing information as an additional label in thenetwork. The second approach increaseslabel stack, thus increasing thesizedepth of the label stack byone label. This consequently affects operations on ingress, transit and egress LSRs. The sub-approach of signaling the load-balancing labels increases signaling and forwarding state, and so suffers from some of the problems of the first approach. The approach advocated by this memo, and the only one described in detail, is the one where the load-balancing labels are not signaled.one. With this approach, there is minimal change to signaling state for a FEC; also, there is no change in forwarding operations in transit LSRs, and no increase of forwarding state in any LSR. The only purpose ofthese labelsthe additional label is to increase the entropy in the label stack, sothey arethis is called an "entropylabels".label". This memo focuses solely on this approach. 3. Entropy Labels An entropy label (as used here) is a label: 1. that is not used for forwarding; 2. that is not signaled; and 3. whose only purpose in the label stack is to provide"entropy"'entropy' to improve load balancing. Entropy labels are generated by an ingress LSR, based entirely on load balancing information. However, they MUST NOT have values in the reserved label space (0-15). Entropy labels MUST be at the bottom of the label stack, and thus the"end-of-stack"'Bottom of Stack' (S) bit ([RFC3032]) in the label should be set. To ensure that they are not used inadvertently for forwarding, entropy labels SHOULD have a TTL of 0. Since entropy labels are generated bythean ingress LSR, an egress LSR MUST be able to tell unambiguously that a given label is an entropy label.This of course depends on the underlying application.If any ambiguity is possible, the label above the entropy label MUST be an"entropy'entropy labelindicator"indicator' (ELI), whichsaysindicates that the followinglabelLabel is an entropy label.TheAn ELImay be signaled, or may be a reservedis typically signaled by an egress LSR and is added to the MPLS labelreserved specifically for this purpose. Fortunately, forstack along with an entropy label by an ingress LSR. For many applications, the use of entropy labels is unambiguous, anddoesan ELI is notneedneeded. If used, anELI.ELI MUST have S = 0 and SHOULD have a TTL of 0. Applications for MPLS entropy labels include pseudowires([RFC4447], [I-D.ietf-pwe3-fat-pw]),([RFC4447]), Layer 3VPN'sVPNs ([RFC4364]), VPLS ([RFC4761], [RFC4762]) and TunnelLSPs. This memo specifies general properties of entropy labels, and the signaling ofLSPs carrying, say, IP traffic. [I-D.ietf-pwe3-fat-pw] explains how entropy labels can be used forLDP ([RFC5036]) tunnel LSPs. Other memos will specify the signalingRFC 4447-style pseudowires, andusethus is complementary to this memo, which focuses on several other applications of entropylabels for specific applications.labels. 4.Forwarding and Load Balancing Behaviors forData Plane Processing of Entropy Labels 4.1. Ingress LSR Suppose that for a particular application (or service or FEC), an ingress LSR Xhasis to push label stack <TL, AL>, where TL is the"tunnel label"'tunnel label' and AL is theapplication label.'application label'. (Note the use of the convention for label stacks described in Section1.2.1.1. The use of a two-label stack is just for illustrative purposes.) Suppose furthermore that the egress LSR Y has told X that it isto usecapable of processing entropy labels for this application.Thus, the resultantIf X can insert entropy labels, it may use a label stackwill beof <TL, AL,EL>,EL> for this application, where EL is the entropy label. When a packet for thisFECapplication arrives at X, Xmust first determinedoes thefields that it will use for load balancing. Typically, X will then generate a hash H over those fields.following: 1. Xwill then pick anidentifies the application to which the packet belongs, identifies the egress LSR as Y, and thereby picks the outgoing label stack <TL, AL> to pushononto thepacket. However,packet to send to Y; 2. Xmust also generatedetermines which keys that it will use for load balancing; 3. X, having kept state that Y can process entropy labels for this application, generates an entropy label EL (basedeither directlyon the output of the load balancingfields, or on the hash H). EL is a "regular" 32-bit label, encoded in the usual way; however, the EOS bit MUST be 1function), andthe TTL field MUST be 0.4. Xthenpushes <TL, AL, EL> on to the packet before forwarding it to the nextLSR.LSR on its way to Y. EL is a 'regular' 32-bit label whose S bit MUST be 1 and whose TTL field SHOULD be 0. The load balancing information is encoded in the 20-bit label field. If X is told (via signaling) that it must use an entropy label indicatorELI,with label value E, then X instead pushes <TL, AL, ELI, EL>on toonto thepacket.packet, where ELI is a label whose S bit MUST be 0, whose TTL SHOULD be 0, and whose 20-bit label field MUST be E. The CoS fields for EL and ELI can be set to any values. Note that ingress LSR X MUST NOT include an entropy label unless the egress LSR Y for thisFECapplication has indicated that it is ready to receive entropy labels. Furthermore, ifthe egress LSRY has signaled that an ELI is needed, then X MUST include the ELIwithbefore the entropylabel; otherwise, X MUST NOTlabel. Note that the signaling and use of entropylabels.labels in one direction (signaling from Y to X, and data path from X to Y) has no bearing on the behavior in the opposite direction (signaling from X to Y, and data path from Y to X). 4.2. Transit LSR Transit LSRs have virtually no change in forwarding behavior. For load balancing, transit LSRs SHOULD use the whole label stack(e.g.,as keys forcomputingthe loadbalance hash).balancing function. Transit LSRs MAY choose to look beyond the label stack for furtherload balancing information;keys; however, if entropy labels are being used, this may not be very useful.In a mixedLooking beyond the label stack may be the simplest approach in an environment(orwhere some ingress LSRs use entropy labels and others don't, or for backwardcompatibility), this is the simplest approach.compatibility. Thus, other than using the full label stack as input to the load balancing function, transit LSRs are almost unaffected by the use of entropy labels.If transit LSRs were programmed to use a subset of the label stack, they may have to be reconfigured to use the full stack. But otherwise, no changes are needed.4.3. EgressLSRs An ingressLSRX MUST NOT send entropy labels to an egressIf egresss LSR Yunless Y has signaled its readiness to receive such labels. Y must also determine (for a particular application or FEC), whether it can distinguish whether the ingress has added an entropy label or not; if Y cannot do so, Y MUST request that an ELI be used for this FEC. Alternatively, Y MUST require the use of entropy labels. (See Section 5 for more details on signaling.) Suppose Y has signaledsignals that it isprepared to receivecapable of processing entropy labelsfor a given FEC. In this case, Y must be able to distinguish whether an ingress LSR has insertedwithout anentropy label or not based solely on the 'end-of-stack' (EOS) bit on the application labelELI forthis FEC. Whenan application, then when Y receives a packet withthisthe application label, then Y looks to see if theEOSS bit is set. Ifnot,so, Y applies its usual processing rules to the packet, including popping the application label. If the S bit is not set, Y assumes that the label below the application label is an entropy label and popsit.both the application label and the entropy label. YMAY choose toSHOULD ensure that the entropy label has itsEOSS bitset and TTL=0.set. Y then processes the packet as usual. Implementations may choose the order in which they apply these operations, but the net result should be as specified.5. Signaling for Entropy Labels Signaling forIf Y signals that it is capable of processing entropy labelsexchanges three types of information: 1. whetherbut that anLSR YELI isprepared to receive entropy labels, 2. whether receiving LSRnecessary for a given application, then when Yrequires ELIsreceives a packet withentropy labels, and if so, whatthe application label, Y processes the application labelto useasthe ELI, and 3.usual, then pops it. Y then checks whetheran LSR Xthe S bit on the application label isable to send entropy labels. The uses of this information can be illustrated as follows.set. Ifan LSRnot, Yis preparedlooks toreceive entropy labels for ansee if the label below the application(or FEC), it signalslabel is the ELI. If so, Y further pops both the ELI and the label below (which should be the entropy label). Y SHOULD ensure thattotheingress LSR(s). That meansELI has its S bit unset, and thatan ingress LSR for this application MAY send anthe entropy label has its S bit set. If the S bit of the application label is set, or the label below is not the ELI, Y processes the packet as usual (there is no entropy label). 5. Signaling forthis application;Entropy Labels An egress LSR YMUST be ablemay signal todistinguish whether or not aningress LSR(s) its ability to process entropylabel was sent based solely on the EOS bitlabels on a per-application (or per-FEC) basis. As part of this signaling, Y also signals theapplication label.ELI to use, if any. In cases where an application label isused, Y does not need to signal an ELI for this FEC. However, Y MUST clear the EOS bit onused and must be theapplicationbottommost labelto indicate thatin the label stack, Y MAY signal thatfollows will be an Entropy Label.no ELI is needed for that application. In cases where no application label exists, or where the application label may not be the bottommost label in the label stack, YcanMUST signalthat ana valid ELIMUSTto be used in conjunction with the entropy label for thisFEC; Y may also signal what ELI to use.FEC. In this case, an ingress LSR will either notsendadd an entropy label, or push the ELI before the entropy label. This makes theuse/non-useuse or non-use of an entropy labelunambiguous. However, this also increases the size ofby the ingress LSR unambiguous. Valid ELI labelstack.values are strictly greater than 15. It should be noted that egress LSR Y may use the same ELI value for all applications for which an ELI is needed. Thespecific protocols and encoding detailsELI MUST be a label that does not conflict with any other labels that Y has advertised to other LSRs for other applications. Furthermore, it should be noted that theabove will depend onability to process entropy labels (and theunderlying application; see [I-D.ietf-pwe3-fat-pw] forcorresponding ELI) may be asymmetric: anexampleLSR X may be willing to process entropy labels, whereas LSR Y may not be willing to process entropy labels. The signaling extensions below allow forpseudowires.this asymmetry. For an illustration of signaling and forwarding with entropy labels, see Figure 9. 5.1. LDP Signaling When using LDP for signaling tunnel labels ([RFC5036]), a Label Mapping Message sub-TLV (Entropy Label sub-TLV)typeis used tosynchronize the entropy label states between the ingress andsignal an egressPE's.LSR's ability to process entropy labels. The presence of the Entropy Label sub-TLV in the Label Mapping Message indicates totheingressPELSRs that the egressPELSR cancorrectlyprocessaan entropy label. In addition, the Entropy Label sub-TLV contains a label valuethat must be inserted asfor the ELI. If the ELIbyis zero, this indicates theingress PE, assumingegress doesn't need an ELI for theingress PE can apply entropy labels to outgoing packets. It should be noted thatsignaled application; if not, the egressPE only needs to send a single Label value forrequires theELI, which does not conflictgiven ELI withany other labels it has advertised to other PE's for other applications. 5.1.1. Structure of Entropy Label sub-TLVentropy labels. An example where an ELI is needed is when the signaled application is an LSP that can carry IP traffic. The structure of the Entropy Label sub-TLV is shownin Figure 1.below. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type (TBD) | Length (8) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |ELI LabelValue | Must Be Zero | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: Entropy Label sub-TLVWhere:where: U: Unknown bit. This bit MUST be set to 1. If the Entropy Label sub-TLV is not understood, then the TLV is not known to the receiver and MUST be ignored. F: Forward bit. This bit MUST be set be set to 1. Since this sub-TLV is going to be propagated hop-by-hop, the sub-TLV should be forwarded even bydevicesnodes that may not understand it. Type: sub-TLV Typefield. 'Entropy Label sub-TLV'field, as specified by IANA. Length: sub-TLV Length field. This field specifies the total length in octets of the Entropy Label sub-TLV.ELI Label:Value: value of the Entropy Label Indicator Label.The5.2. BGP Signaling When BGP [RFC4271] is used for distributing Network Layer Reachability Information (NLRI) as described in, for example, [RFC3107], [RFC4364] and [RFC4761], the BGP UPDATE message may include the Entropy LabelIndicator (ELI) label notifiesattribute. This is an optional, transitive BGP attribute of type TBD. The inclusion of this attribute with an NLRI indicates that thereceiveradvertising BGP router can process entropy labels as an egress LSR for that NLRI. If thefollowingattribute length is less than three octets, this indicates that the egress doesn't need an ELI for the signaled application. If the attribute length is at least three octets, the first three octets encode an ELI labelinvalue as theMPLS Label stackhigh order 20 bits; the egress requires this ELI with entropy labels. An example where an ELI is needed is when theEntropy Label. It should be notedNLRI contains unlabeled IP prefixes. A BGP speaker S that originates an UPDATE should only include theELIEntropy Labelis unnecessaryattribute if both of the following are true: A1: S sets the BGP NEXT_HOP attribute to itself; AND A2: S can process entropy labels forprotocols that usethe given application. If both A1 and A2 are true, and S needs anapplicationELI to recognize entropy labels, then S MUST include the ELI labelthat precedesvalue as part of the EntropyLabel.LabelThisattribute. An UPDATE SHOULD contain at most one Entropy Label attribute. Suppose a BGP speaker T receives an UPDATE U with the Entropy Label attribute ELA. T has two choices. T can simply re-advertise U with the same ELA if either of the following is true: B1: T does not change the NEXT_HOP attribute; OR B2: T simply swaps labels without popping the entire label stack and processing the payload below. An example of the use of B1 is Route Reflectors; an example of the use of B2 is illustrated in Section 9.3.1.2. However, if T changes the NEXT_HOP attribute for U and in the data plane pops the entire label stack to process the payload, T MUST remove ELA. T MAY include a20-bitnew Entropy Label attribute ELA' for UPDATE U' if both of the following are true: C1: T sets the NEXT_HOP attribute of U' to itself; AND C2: T can process entropy labels for the given application. Again, if both C1 and C2 are true, and T needs an ELI to recognize entropy labels, then T MUST include the ELI label valuerepresentedasa 20-bit numberpart of the Entropy Label attribute. 5.3. RSVP-TE Signaling Entropy Label support is signaled in RSVP-TE [RFC3209] using an Entropy Label Attribute TLV (Type TBD) of the LSP_ATTRIBUTES object [RFC5420]. The presence of this attribute indicates that the signaler (the egress in the downstream direction using Resv messages; the ingress in the upstream direction using Path messages) can process entropy labels. The Entropy Label Attribute contains a4 octet fieldvalue for the ELI. If the ELI is zero, this indicates that the signaler doesn't need an ELI for this application; if not, then the signaler requires the given ELI with entropy labels. An example where an ELI is needed is when the signaled LSP can carry IP traffic. The format of the Entropy Label Attribute is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Entropy Label Attribute | Length (4) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ELI Label | MBZ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Figure 2:An egress LSR includes the Entropy LabelIndicatorAttribute in a Resv message to indicate that it can process entropy labels in the downstream direction of the signaled LSP. An ingress LSR includes the Entropy Label5.2. RSVP Signaling TBD. 5.3. BGP Signaling TBD.Attribute in a Path message for a bi-directional LSP to indicate that it can process entropy labels in the upstream direction of the signaled LSP. If the signaled LSP is not bidirectional, the Entropy Label Attribute SHOULD NOT be included in the Path message, and egress LSR(s) SHOULD ignore the attribute, if any. As described in Section 8, there is also the need to distribute an ELI from the ingress (upstream label allocation). In the case of RSVP-TE, this is accomplished using the Upstream ELI Attribute TLV of the LSP_ATTRIBUTES object, as shown below: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Upstream ELI Attribute | Length (4) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ELI Label | MBZ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 6.MPLS-TPOperations, Administration, and Maintenance (OAM) and Entropy LabelsInteroperabilityGenerally OAM comprises a set of functions operating in the data plane to allow a network operator to monitor its network infrastructure and to implement mechanisms in order to enhance the general behavior and the level of performance of its network, e.g., the efficient and automatic detection, localization, diagnosis and handling of defects. Currently defined OAM mechanisms for MPLS include LSP Ping/Traceroute [RFC4379] and Bidirectional Failure Detection (BFD) for MPLS [RFC5884]. The latter provides connectivity verification between the endpoints of an LSP, and recommends establishing a separate BFD session for every path between the endpoints. The LSP traceroute procedures of [RFC4379] allow an ingress LSR to obtain label ranges that can be used to send packets on every path to the egress LSR. It works by having ingress LSR sequentially ask the transit LSRs along a particular path to a given egress LSR to return a label range such that the inclusion of a label in that range in a packet will cause the replying transit LSR to send that packet out the egress interface for that path. The ingress provides the label range returned by transit LSR N to transit LSR N + 1, which returns a label range which is less than or equal in span to the range provided to it. This process iterates until the penultimate transit LSR replies to the ingress LSR with a label range that is acceptable to it and to all LSRs along path preceding it for forwarding a packet along the path. However, the LSP traceroute procedures do not specify where in the label stack the value from the label range is to be placed, whether deep packet inspection is allowed and if so, which keys and key values are to be used. This memo updates LSP traceroute by specifying that the value from the label range is to be placed in the entropy label. Deep packet inspection is thus not necessary, although an LSR may use it, provided it do so consistently, i.e., if the label range to go to a given downstream LSR is computed with deep packet inspection, then the data path should use the same approach and the same keys. In order to have a BFD session on a given path, a value from the label range for that path should be used as the EL value for BFD packets sent on that path. As part of the MPLS-TP work, an in-band OAM channel is defined in [RFC5586]. Packets sent in this channel are identified with a reserved label, the Generic Associated Channel Label (GAL)are outsideplaced at thescopebottom of the MPLS label stack. In order to use the inband OAM channel with entropy labels, thisdocument.memo relaxes the restriction that the GAL must be at the bottom of the MPLS label stack. Rather, the GAL is placed in the MPLS label stack above the entropy label so that it effectively functions as an application label. 7. MPLS-TP and Entropy Labels Since MPLS-TP does not use ECMP, entropy labels are not applicable to an MPLS-TP deployment. 8. Point-to-Multipoint LSPs and Entropy Labels Point-to-Multipoint (P2MP) LSPs [RFC4875] typically do not use ECMP for load balancing, as the combination of replication and multipathing can lead to duplicate traffic delivery. However, P2MP LSPs can traverse Bundled Links [RFC4201] and LAGs. In both these cases, load balancing is useful, and hence entropy labels can be of some value for P2MP LSPs. There are two potential complications with the use of entropy labels in the context of P2MP LSPs, both a consequence of the fact that the entire label stack below the P2MP label must be the same for all egress LSRs. First, all egress LSRs must be willing to receive entropy labels; if even one egress LSR is not willing, then entropy labels MUST NOT be used for this P2MP LSP. Second, if an ELI is required, all egress LSRs must agree to the same value of ELI. This can be achieved by upstream allocation of the ELI; in particular, for RSVP-TE P2MP LSPs, the ingress LSR distributes the ELI value using the Upstream ELI Attribute TLV of the LSP_ATTRIBUTES object, defined in Section 5.3. With regard to the first issue, the ingress LSR MUST keep track of the ability of each egress LSR to process entropy labels, especially since the set of egress LSRs of a given P2MP LSP may change over time. Whenever an existing egress LSR leaves, or a new egress LSR joins the P2MP LSP, the ingress MUST re-evaluate whether or not to include entropy labels for the P2MP LSP. In some cases, it may be feasible to deploy two P2MP LSPs, one to entropy label capable egress LSRs, and the other to the remaining egress LSRs. However, this requires more state in the network, more bandwidth, and more operational overhead (tracking EL-capable LSRs, and provisioning P2MP LSPs accordingly). Furthermore, this approach may not work for some applications (such mVPNs and VPLS) which automatically create and/or use P2MP LSPs for their multicast requirements. 9. Entropy Labels and Applications This section describes the usage of entropy labels in various scenarios with different applications. 9.1. Tunnels Tunnel LSPs, signaled with either LDP or RSVP-TE, typically carry other MPLS applications such as VPNs or pseudowires. This being the case, if the egress LSR of a tunnel LSP is willing to process entropy labels, it would signal the need for an Entropy Label Indicator to distinguish between entropy labels and other application labels. In the figures below, the following convention is used to depict information signaled between X and Y: X ---------- ... ---------- Y app: <--- [label L, ELI value] This means Y signals to X label L for application app. The ELI value can be one of: -: meaning entropy labels are NOT accepted; 0: meaning entropy labels are accepted, no ELI is needed; or E: entropy labels are accepted, ELI label E is required. The following illustrates a simple intra-AS tunnel LSP. X -------- A --- ... --- B -------- Y tunnel LSP L: [TL, E] <--- ... <--- [TL0, E] IP pkt: push <TL, E, EL> ---------------> Figure 2: Tunnel LSPs and Entropy Labels Tunnel LSPs may cross Autonomous System (AS) boundaries, usually using BGP ([RFC3107]). In this case, the AS Border Routers (ASBRs) MAY simply propagate the egress LSR's ability to process entropy labels, or they MAY declare that entropy labels may not be used. If an ASBR (say A2 below) chooses to propagate the egress LSR Y's ability to process entropy labels, A2 MUST also propagate Y's choice of ELI. X ---- ... ---- A1 ------- A2 ---- ... ---- Y intra-AS LSP A2-Y: <--- [TL0, E] inter-AS LSP A1-A2: [AL, E] intra-AS LSP X-A1: <--- [TL1, E] IP pkt: push <TL1, E, EL> Here, ASBR A2 chooses to propagate Y's ability to process entropy labels, by "translating" Y's signaling of entropy label capability (say using LDP) to BGP; and A1 translate A2's BGP signaling to (say) RSVP-TE. The end-to-end tunnel (X to Y) will have entropy labels if X chooses to insert them. Figure 3: Inter-AS Tunnel LSP with Entropy Labels X ---- ... ---- A1 ------- A2 ---- ... ---- Y intra-AS LSP A2-Y: <--- [TL0, E] inter-AS LSP A1-A2: [AL, E] intra-AS LSP X-A1: <--- [TL1, -] IP pkt: push <TL1> --> Here, ASBR A1 decided that entropy labels are not to be used; thus, the end-to-end tunnel cannot have entropy labels, even though both X and Y may be capable of inserting and processing entropy labels. Figure 4: Inter-AS Tunnel LSP with no Entropy Labels 9.2. LDP Pseudowires [I-D.ietf-pwe3-fat-pw] describes the signaling and use of entropy labels in the context of RFC 4447 pseudowires, so this will not be described further here. [RFC4762] specifies the use of LDP for signaling VPLS pseudowires. An egress VPLS PE that can process entropy labels can indicate this by adding the Entropy Label sub-TLV in the LDP message it sends to other PEs. An ELI is not required. An ingress PE must maintain state per egress PE as to whether it can process entropy labels. X -------- A --- ... --- B -------- Y tunnel LSP L: [TL, E] <--- ... <--- [TL0, E] VPLS label: <------------------------ [VL, 0] VPLS pkt: push <TL, VL, EL> --------------> Figure 5: Entropy Labels with LDP VPLS Note that although the underlying tunnel LSP signaling indicated the need for an ELI, VPLS packets don't need an ELI, and thus the label stack pushed by X do not have one. [RFC4762] also describes the notion of "hierarchical VPLS" (H-VPLS). In H-VPLS, 'hub PEs' remove the label stack and process VPLS packets; thus, they must make their own decisions on the use of entropy labels, independent of other hub PEs or spoke PEs with which they exchange signaling. In the example below, spoke PEs X and Y and hub PE B can process entropy labels, but hub PE A cannot. X ---- ... ---- A ---- ... ---- B ---- ... ---- Y spoke PW1: <--- [SL1, 0] hub-hub PW: <---- [HL, 0] spoke PW2: <--- [SL2, -] SPW2 pkt: push <TL1, SL2> H-H PW pkt: push <TL2,HL,EL> SPW1 pkt: push <TL3,SL1,EL> Figure 6: Entropy Labels with H-VPLS 9.3. BGP Applications Section 9.1 described a BGP application for the creation of inter-AS tunnel LSPs. This section describes two other BGP applications, IP VPNs ([RFC4364]) and BGP VPLS ([RFC4761]). An egress PE for either of these applications indicates its ability to process entropy labels by adding the Entropy Label attribute to its BGP UPDATE message. Again, ingress PEs must maintain per-egress PE state regarding its ability to process entropy labels. In this section, both of these applications will be referred to as VPNs. In the intra-AS case, PEs signal application labels and entropy label capability to each other, either directly, or via Route Reflectors (RRs). If RRs are used, they must not change the BGP NEXT_HOP attribute in the UPDATE messages; furthermore, they can simply pass on the Entropy Label attribute as is. X -------- A --- ... --- B -------- Y tunnel LSP L: [TL, E] <--- ... <--- [TL0, E] BGP VPN label: <------------------------ [VL, 0] BGP VPN pkt: push <TL, VL, EL> --------------> Figure 7: Entropy Labels with Intra-AS BGP apps For BGP VPLS, the application label is at the bottom of stack, so no ELI is needed. For BGP IP VPNs, the application label is usually at the bottom of stack, so again no ELI is needed. However, in the case of Carrier's Carrier (CsC) VPNs, the BGP VPN label may not be at the bottom of stack. In this case, an ELI is necessary for CsC VPN packets with entropy labels to distinguish them from nested VPN packets. In the example below, the nested VPN signaling is not shown; the egress PE for the nested VPN (not shown) must signal whether or not it can process egress labels, and the ingress nested VPN PE may insert an entropy label if so. Three cases are shown: a plain BGP VPN packet, a CsC VPN packet originating from X, and a transit nested VPN packet originating from a nested VPN ingress PE (conceptually to the left of X). It is assumed that the nested VPN packet arrives at X with label stack <ZL, CVL> where ZL is the tunnel label (to be swapped with <TL, CL>) and CVL is the nested VPN label. Note that Y can use the same ELI for the tunnel LSP and the CsC VPN (and any other application that needs an ELI). X -------- A --- ... --- B -------- Y tunnel LSP L: [TL, E] <--- ... <--- [TL0, E] BGP VPN label: <------------------------ [VL, 0] BGP CsC VPN label: <------------------------ [CL, E] BGP VPN pkt: push <TL, VL, EL> --------------> CsC VPN pkt: push <TL, CL, E, EL> -----------> nested VPN pkt: swap <ZL> with <TL, CL> --------> Figure 8: Entropy Labels with CoC VPN 9.3.1. Inter-AS BGP VPNs There are three commonly used options for inter-AS IP VPNs and BGP VPLS, known informally as "Option A", "Option B" and "Option C". This section describes how entropy labels can be used in these options. 9.3.1.1. Option A Inter-AS VPNs In option A, an ASBR pops the full label stack of a VPN packet exiting an AS, processes the payload header (IP or Ethernet), and forwards the packet natively (i.e., as IP or Ethernet, but not as MPLS) to the peer ASBR. Thus, entropy label signaling and insertion are completely local to each AS. The inter-AS paths do not use entropy labels, as they do not use a label stack. 9.3.1.2. Option B Inter-AS VPNs The ASBRs in option B inter-AS VPNs have a choice (usually determined by configuration) of whether to just swap labels (from within the AS to the neighbor AS or vice versa), or to pop the full label stack and process the packet natively. This choice occurs at each ASBR in each direction. In the case of native packet processing at an ASBR, entropy label signaling and insertion is local to each AS and to the inter-AS paths (which, unlike option A, do have labeled packets). In the case of simple label swapping at an ASBR, the ASBR can propagate received entropy label signaling onward. That is, if a PE signals to its ASBR that it can process entropy labels (via an Entropy Label attribute), the ASBR can propagate that attribute to its peer ASBR; if a peer ASBR signals that it can process entropy labels, the ASBR can propagate that to all PEs within its AS). Note that this is the case even though ASBRs change the BGP NEXT_HOP attribute to "self", because of clause B2 in Section 5.2. 9.3.1.3. Option C Inter-AS VPNs In Option C inter-AS VPNs, the ASBRs are not involved in signaling; they do not have VPN state; they simply swap labels of inter-AS tunnels. Signaling is PE to PE, usually via Route Reflectors; however, if RRs are used, the RRs do not change the BGP NEXT_HOP attribute. Thus, entropy label signaling and insertion are on a PE- pair basis, and the intermediate routers, ASBRs and RRs do not play a role. 9.4. Multiple Applications It has been mentioned earlier that an ingress PE must keep state per egress PE with regard to its ability to process entropy labels. An ingress PE must also keep state per application, as entropy label processing must be based on the application context in which a packet is received (and of course, the corresponding entropy label signaling). In the example below, an egress LSR Y signals a tunnel LSP L, and is prepared to receive entropy labels on L, but requires an ELI. Furthermore, Y signals two pseudowires PW1 and PW2 with labels PL1 and PL2, respectively, and indicates that it can receive entropy labels for both pseudowires without the need of an ELI; and finally, Y signals a L3 VPN with label VL, but Y does not indicate that it can receive entropy labels for the L3 VPN. Ingress LSR X chooses to send native IP packets to Y over L with entropy labels, thus X must include the given ELI (yielding a label stack of <TL, ELI, EL>). X chooses to add entropy labels on PW1 packets to Y, with a label stack of <TL, PL1, EL>, but chooses not to do so for PW2 packets. X must not send entropy labels on L3 VPN packets to Y, i.e., the label stack must be <TL, VL>. X -------- A --- ... --- B -------- Y tunnel LSP L: [TL, E] <--- ... <--- [TL0, E] PW1 label: <----------------------- [PL1, 0] PW2 label: <----------------------- [PL2, 0] VPN label: <----------------------- [VL, -] IP pkt: push <TL, ELI, EL> -------------> PW1 pkt: push <TL, PL1, EL> -------------> PW2 pkt: push <TL, PL2> -----------------> VPN pkt: push <TL, VL> ------------------> Figure 9: Entropy Labels for Multiple Applications 10. Security Considerations This document describes advertisement of the capability to support receipt of entropy-labels and an Entropy Label Indicator that an ingressPELSR may apply to MPLS packets in order to allowCore LSR'stransit LSRs to attain better load-balancing across LAG and/or ECMP paths in the network. This document does not introduce new security vulnerabilities to LDP. Please refer to the Security Considerations section of LDP ([RFC5036]) for security mechanisms applicable to LDP.8.Given that there is no end-user control over the values used for entropy labels, there is little risk of Entropy Label forgery which could cause uneven load-balancing in the network. If Entropy Label Capability is not signaled from an egress PE to an ingress PE, due to, for example, malicious configuration activity on the egress PE, then the PE's will fall back to not using entropy labels for load-balancing traffic over LAG or ECMP paths which, in some cases, in no worse than the behavior observed in current production networks. That said, operators are recommended to monitor changes to PE configurations and, more importantly, the fairness of load distribution over equal-cost LAG or ECMP paths. If the fairness of load distribution over a set of paths changes that could indicate a misconfiguration, bug or other non-optimal behavior on their PE's and they should take corrective action. Given that most applications already signal an Application Label, e.g.: IPVPNs, LDP VPLS, BGP VPLS, whose Bottom of Stack bit is being re-used to signal entropy label capability, there is little to no additional risk that traffic could be misdirected into an inappropriate IPVPN VRF or VPLS VSI at the egress PE. In the context of downstream-signaled entropy labels that require the use of an Entropy Label Indicator (ELI), there should be little to no additional risk because the egress PE is solely responsible for allocating an ELI value and ensuring that ELI label value DOES NOT conflict with other MPLS labels it has previously allocated. On the other hand, for upstream-signaled entropy labels, e.g.: RSVP-TE point-to-point or point-to-multipoint LSP's or Multicast LDP (mLDP) point-to-multipoint or multipoint-to-multipoint LSP's, there is a risk that the head-end MPLS LER may choose an ELI value that is already in use by a downstream LSR or LER. In this case, it is the responsibility of the downstream LSR or LER to ensure that it MUST NOT accept signaling for an ELI value that conflicts with MPLS label(s) that are already in use. 11. IANA Considerations 11.1. LDP Entropy Label TLV IANA is requested to allocate the next available value from the IETF Consensus range in the LDP TLV Type Name Space Registry as the "Entropy Label TLV". 11.2. BGP Entropy LabelTLV. 9.Attribute IANA is requested to allocate the next available Path Attribute Type Code from the "BGP Path Attributes" registry as the "BGP Entropy Label Attribute". 11.3. Attribute Flags for LSP_Attributes Object IANA is requested to allocate a new bit from the "Attribute Flags" sub-registry of the "RSVP TE Parameters" registry. Bit | Name | Attribute | Attribute | RRO No | | Flags Path | Flags Resv | ----+----------------------+------------+------------+----- TBD Entropy Label LSP Yes Yes No 11.4. Attributes TLV for LSP_Attributes Object IANA is requested to allocate the next available value from the "Attributes TLV" sub-registry of the "RSVP TE Parameters" registry. 12. Acknowledgments We wish to thank Ulrich Drafzand John Drakefortheirhis contributions, as well as the entire"hash label"'hash label' team for their valuable comments and discussion.10.13. References10.1.13.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.10.2.[RFC3032] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y., Farinacci, D., Li, T., and A. Conta, "MPLS Label Stack Encoding", RFC 3032, January 2001. [RFC3107] Rekhter, Y. and E. Rosen, "Carrying Label Information in BGP-4", RFC 3107, May 2001. [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP Tunnels", RFC 3209, December 2001. [RFC5420] Farrel, A., Papadimitriou, D., Vasseur, JP., and A. Ayyangarps, "Encoding of Attributes for MPLS LSP Establishment Using Resource Reservation Protocol Traffic Engineering (RSVP-TE)", RFC 5420, February 2009. 13.2. Informative References [I-D.ietf-pwe3-fat-pw] Bryant, S., Filsfils, C., Drafz, U., Kompella, V., Regan, J., and S. Amante, "Flow Aware Transport of Pseudowires over an MPLS PSN",draft-ietf-pwe3-fat-pw-03draft-ietf-pwe3-fat-pw-05 (work in progress),JanuaryOctober 2010. [RFC4201] Kompella, K., Rekhter, Y., and L. Berger, "Link Bundling in MPLS Traffic Engineering (TE)", RFC 4201, October 2005. [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, January 2006. [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private Networks (VPNs)", RFC 4364, February 2006. [RFC4379] Kompella, K. and G. Swallow, "Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures", RFC 4379, February 2006. [RFC4447] Martini, L., Rosen, E., El-Aawar, N., Smith, T., and G. Heron, "Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)", RFC 4447, April 2006. [RFC4761] Kompella, K. and Y. Rekhter, "Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling", RFC 4761, January 2007. [RFC4762] Lasserre, M. and V. Kompella, "Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling", RFC 4762, January 2007. [RFC4875] Aggarwal, R., Papadimitriou, D., and S. Yasukawa, "Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs)", RFC 4875, May 2007. [RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP Specification", RFC 5036, October 2007. [RFC5586] Bocci, M., Vigoureux, M., and S. Bryant, "MPLS Generic Associated Channel", RFC 5586, June 2009. [RFC5884] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow, "Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)", RFC 5884, June 2010. Appendix A. Applicability of LDP Entropy Label sub-TLV In the case of unlabeled IPv4 (Internet) traffic, the Best Current Practice is for an egressPELSR to propagate eBGP learned routes within a SP's Autonomous System after resetting the BGP next-hop attribute totheone of its Loopback IPaddress of the egress PE.addresses. That Loopback IP address is injected into the Service Provider's IGP and, concurrently, a label assigned to it via LDP. Thus, when an ingressPELSR is performing a forwarding lookup for a BGP destination it recursively resolves the associated next-hop to a Loopback IP address and associated LDP label of the egressPE.LSR. Thus, in the context of unlabeled IPv4 traffic, the LDP Entropy Label sub-TLV will typically be applied only to the FEC for the Loopback IP address of the egressPE.LSR and the egress LSR will not announce an entropy label capability for the eBGP learned route. Authors' Addresses Kireeti Kompella Juniper Networks 1194 N. Mathilda Ave. Sunnyvale, CA 94089 US Email: kireeti@juniper.net John Drake Juniper Networks 1194 N. Mathilda Ave. Sunnyvale, CA 94089 US Email: jdrake@juniper.net Shane Amante Level 3 Communications, LLC 1025 Eldorado Blvd Broomfield, CO 80021 US Email: shane@level3.net Wim Henderickx Alcatel-Lucent Copernicuslaan 50 2018 Antwerp Belgium Email: wim.henderickx@alcatel-lucent.com Lucy Yong Huawei USA 1700 Alma Dr. Suite 500 Plano, TX 75075 US Email: lucyyong@huawei.com