Routing Working Group IJ. Wijnands, Ed. Internet-DraftCiscoL. De Ghein Intended status: Standards TrackA. Csaszar, Ed.Cisco Expires:April 18, 2013January 9, 2014 G. Enyedi, Ed. A. Csaszar J. Tantsura EricssonOctober 15, 2012July 8, 2013 Tree Notification to Improve Multicast Fast Reroutedraft-wijnands-rtgwg-mcast-frr-tn-00draft-wijnands-rtgwg-mcast-frr-tn-01 Abstract This draft proposesusingdataplane triggerednotifications in orderTree Notifications to support multicast fast reroutemethods in various ways. Sending such notifications downfor PIM and mLDP. These Tree Notifications are initiated by a node detecting thetree can be used to trigger fail-over in nodes not adjacentfailure to a Repair Node downstream. A Repair Node is a node that has a pre-built backup path that can circumvent the failure.Sending such dataplane notification upUsing this mechanism, a Repair Node has thetree can helpability toactivatelearn about non-local failures quickly without having to wait for the IGP to convergence. This draft also covers an optional method to avoid bandwidth usage on the pre-builtstandbybackuptree segments.path. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onApril 18, 2013.January 9, 2014. Copyright Notice Copyright (c)20122013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.Table of Contents 1. Terminology and Definitions . . . . . . . . . . . . . . . . .43 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .54 3. Improving non-local failures . . . . . . . . . . . . . . . . .54 3.1. Downstream Tree Notifications . . . . . . . . . . . . . .65 3.2.DTNP processing/forwarding . . . . . . .DTN processing logic . . . . . . . . .6 4. Reduce the bandwidth consumption in failure-free network. . .8 4.1. Upstream Tree Notifications. . . . . . . 6 3.3. Repair Node discovery . . . . . . . .8 4.2. Joining a tree in dedicated backup status. . . . . . . .9 4.2.1. Single topology environment. . 8 3.3.1. Repair Node Information item . . . . . . . . . . .9 4.2.2. Multi-Topology Environment. . 8 3.4. Reduce the bandwidth consumption in networks with fast failover response times . . . . . . . . . . . .10 4.3. Activation. . . . . 8 3.4.1. Joining a secondary tree in blocking mode . . . . . . 9 3.4.2. Upstream Tree Notifications . . . . . . . . . . . . . 104.4.3.5. MRT/MCI-Only Mode . . . . . . . . . . . . . . . . . . . . 105. The3.6. TNPacket . . . .Authentication . . . . . . . . . . . . . . . . . . . . 115.1.3.7. The TN PacketFormat. . . . . . . . . . . . . . . . . . . . . . 115.1.1.3.7.1. TNTimeStamp TLVPacket Format . . . . . . . . . . . . . . .12 5.2. Origination of TN Packets . . . . . .. . . .. . . . . . 13 6. IP/PIM Specific11 3.7.1.1. TNComponents . . . . . . . . . . . . . . . . 13 6.1. IP/PIM Downstream Tree Notifications . . . . . . . . . .TimeStamp TLV Format .13 6.2. IP/PIM Upstream Tree Notifications. . . . . . . . . . . . 136.3. Incremental deployment . . . . .3.7.1.2. TN Signature TLV Format . . . . . . . . . . . . . 147. mLDP4. PIM Specific TN Components . . . . . . . . . . . . . . . . .14 7.1. mLDP Downstream Tree Notification . . . . . . . . . . .. 157.1.1. Originating a DTNP . . .4.1. RNI item in PIM Join Message . . . . . . . . . . . . . . . 157.1.2. Receiving a DTNP .4.2. Tree Information Item . . . . . . . . . . . . . . . . . .15 7.1.3. Forwarding a DTNP16 4.3. Incremental deployment . . . . . . . . . . . . . . . . . .15 7.2.18 5. mLDPUpstream Tree Notification . . . . . . . . . . . . . 15 7.2.1. Originating a UTNP . . . . . .Specific TN Components . . . . . . . . . . . .15 7.2.2. Receiving a UTNP. . . . . 18 5.1. RNI item in mLDP Label Mapping . . . . . . . . . . . . . .16 7.2.3. Forwarding a UTNP18 5.2. Tree Information Item . . . . . . . . . . . . . . . . . .16 8.20 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . .16 9.20 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . .16 10.20 8. Security Considerations . . . . . . . . . . . . . . . . . . .16 11.21 9. References . . . . . . . . . . . . . . . . . . . . . . . . . .17 11.1.21 9.1. Normative References . . . . . . . . . . . . . . . . . . .17 11.2.21 9.2. Informative References . . . . . . . . . . . . . . . . . .1722 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .1822 1. Terminology and Definitions MoFRR : Multicast only Fast Re-Route. LFA : Loop Free Alternate. mLDP : Multi-point Label Distribution Protocol. PIM : Protocol Independent Multicast. UMH : Upstream Multicast Hop, a candidate next-hop that can be used to reach the root of the tree. tree : Either a PIM (S,G)/(*,G) tree or a mLDP P2MP or MP2MP LSP. OIF : Outgoing InterFace, an interface used to forward multicast packets down the tree towards the receivers. Either a PIM (S,G)/(*,G) tree or a mLDP P2MP or MP2MP LSP. IIF : Incoming InterFace, an interface where multicast traffic is received by a router. MCE : MultiCast Egress, the last node where the multicast stream exits the current transport technology (MPLS-mLDP or IP-PIM) domain or administrative domain. This maybe the router attached to a multicast receiver. MCI : MultiCast Ingress, the node where the multicast stream enters the current transport technology (MPLS-mLDP or IP-PIM) domain. This maybe the router attached to the multicast source.DTNPDTN : Downstream TreeNotification Packet. UTNPNotification. UTN : Upstream TreeNotification Packet. TNPNotification. TN : TreeNotification Packet,Notification, Upstream or Downstream Repair Node : A node that can circumvent the failure. JM : Join Message, the message used to join to a multicast tree, i.e. to build up the tree. In PIM, this is a JOIN message, while in mLDP this corresponds to aLabelMapLabel Mapping message. MRT : Maximally Redundant Trees. Repair Node : The node performing a dual-join to the tree through two different UMHs. Sometimes also called as dual-joining node or merging node (it merges the secondary and primary tree). RNI : The Repair Node Information is an item included in the TN which holds the nessesary repair information when the TN is send to the Repair Node. Branching Node : A node, (i) which is considered as being on the primary tree by its immediate UMH and (ii) which has at least onesecondary type ofOIF on the secondary tree installed for a multicast tree. 2. Introduction Both [I-D.karan-mofrr] and [I-D.atlas-rtgwg-mrt-mc-arch] describe "live-live" multicast protection, where a node joins a tree via different candidate upstream multicast hops (UMH). With MoFRR the list of candidate UMHs can come from either ECMP or Loop Free Alternate (LFA) paths towards the MultiCast Ingress node (MCI). With MRT, the candidate UMHs are determined by looking up the MCI in two different (Red and Blue) topologies. In either case, the multicast traffic is simultaneously received over different paths/topologies for the same tree. The node 'dual-joining' the tree needs a mechanism to prevent duplicate packets being forwarding to the end user. For that reason a node 'dual-joining' the tree only accepts packets from one of the UMHs at the time. Which UMH is preferred is a local decision that can be based on IGP reachability, link status, BFD, traffic flow monitoring, etc... Should the node detect a local failure on the primary UMH, the node has an instantly available secondary UMH thatisit can switch to, simply by unblocking the secondary UMH. The dual-joining node is also called Repair Node in the following. This draft attempts to improve these solutions by: o Improving fail-over time and the reliability of failure detection for non-local failures; and o Reducing the bandwidth consumption in afailure-free network.network with fast failover response times. 3. Improving non-local failures If a failure is not local and happens further upstream, the dual- joining node needs a fastand reliablemechanism (i) to detect the upstream failure and (ii) to learn that other upstream nodes cannot circumvent the failure. Existing methods based on traffic monitoring are limited in scope and work best with a steady state packet flow. Therefore, we propose a method which can trigger the unblocking the secondary UMH independently of the packet flow. Figure 1 shows an example. Consider that, e.g., node A goes down. Nodes C, D and E cannot detect that locally, so they need to resort to other means. After detecting the failure, node C should not change to its secondary UMH (node J) as it won't help for the failure of A. Node D, on the other hand, will have to unblock its secondary UMH (node I). Yet again, with MoFRR, node E should not unblock its secondary UMH (node K): (i) this won't help in resolving the failure of node A, and (ii) one of its upstream nodes (node D in this case) will be able to restore the stream with a fail-over action. 3.1. Downstream Tree NotificationsTheWhen a nodedetectingdetects a local failure of its primary UMH it MUST originate a Downstream Tree NotificationPacket (DTNP)(DTN) to alldownstream branches ofthetree. Each router that receives the DTNP determines ifRepair Nodes directly below it in the multicast tree. The method of discovering such nodes is described in Section 3.3. When a Repair Nodefor that tree. If it is notreceives aRepair Node,DTN containing theDTNP is forwarded further downprimary UMH of thetree. Ifnode, it must switch to thenode issecondary UMH. DTN packets are sent via unicast to the RepairNode, the secondary UMHNode. The packet may be forwarded using any transport that isunblocked andavailable (MPLS or IP) to reach theDTNP is discarded.destination. TheDTNP allowsIP precedence in the IP header should have adownstream router to unambigously identifyvalue of 6 (Internetwork Control). The EXP field (Traffic Class field) in themulticast tree impactedMPLS header should have a value of 6. The DTN packets are identified by a well known port number (to be allocated). Using a well-known port number it is easy for thefailure. In orderRepair Node todecrease reaction time,identify theDTNP SHOULDDTN packet and invoke the procedures as described in this draft. We are proposing to allocate different port numbers for PIM and MDLP since it will beoriginated fromeasier to dispatch thedata plane whenpacket to the right process dealing with this request. When a router detects a localfailure is detected,failure, it should sent out the DTN packet to the Repair Node aswellfast asprocessed inpossible. The sooner thedata plane whenRepair Node gets the packet, the sooner the traffic can be restored. It is recommended that theDTNPDTN packet isreceived. Allpre-created and originated from theinformation necessary to senddata-plain. The same is true for receiving the DTN packet on the Repair Node, the faster it can be processed, the faster the traffic is restored. For both forwarding andreceive a DTNP has toprocessing the DTN, control- plain interaction SHOULD beavailable inavoided to get thedata plane in advance.best failover results. 3.2.DTNP processing/forwardingDTN processing logic When aDTNPDTN packet is receivedfrom an UMH,on thenode MUST check o whetherRepair Node ithas a secondary UMH,must determine which tree andif yes, o whether this particular DTNP was receivedUMH the notification is for. The information encoded in the DTN is specific for the type of tree being used, i.e. PIM vs mLDP. For details on theprimary or secondary UMH,specific encoding see Section 4 ando whether another DTNP had been received beforehand fromSection 5 for theother UMH. Whenever a node receives a DTNP from its primary UMH anddetails. Once thenode has a secondary UMH for which no DTNP had been received beforehand, this node could be aRepairNode, so unblocks its secondary UMH. The DTNP MUST not be forwarded, but thenode hasto storedetermined thefact that a DTNP has been received fortree and theprimary UMH for this multicast tree. If a node receives a DTNP from its primary UMH but does not have a secondaryUMH,this node is nottheRepair Node and MUST forwardfollowing rules are use for processing theDTNP.DTN. 1. Ifa node receives two DTNPs, one fromthe UMH encoded in the DTN packet is the primary UMHand another one fromin the tree, the secondaryUMH, then this node is notUMH MUST become theRepair Nodenew primary UMH anditthe old primary MUSTforwardbecome thelast received DTNP to all branches ofsecondary. 2. If thetree. (SecondaryUMHdoes not need to be unblocked since it cannot remedyencoded in thefailure.) A DTNP received only fromDTN packet is the secondary UMHMUST NOT be forwarded, butin thenode hastree, no action needs tostore the fact thatbe taken. 3. If aDTNPDTN notification has been receivedforon both the primary and secondary UMHfor this multicast tree. Whenever a decision has been taken to originate or forwardin the tree, aDTNP, it willnew DTN notification MUST beautomatically replicatedoriginated toallthe Repair Node(s) downstreamlegs, givenfrom this node. In order for the Repair Node to determine that a DTN notification was received for both the primary and secondary UMH, itismust store the fact amulticast packet. DTNP MUST be replicated also to downstream stand-by legs if such legs exist. It would raise security issues if DTNPs propagated outsideDTN was received for a particular UMH. Consider theoperator network, so MCEs MUST preventexample in Figure 1 below. MCI is the root of a tree thatDTNP packets propagate to receivers or to other domains. Rephrased,includes the nodesMUST NOT forward DTNPs to legs that lead to receivers or to external autonomous systems.as follows (based on the primary UMH). ->F->G->H->I MCI ->A->B->C->D->E Node C, D and E are candidate Repair Nodes. -- Primary UMH ++ Secondary UMH +-+ +-+ +-+ +-+|F|---|G|---|H|---|I||F|+++|G|+++|H|+++|I| +-+ +-+ +-+ +-+/ \ / \+ + + + +---+ +-+ +-+ +-+ +-+ +-+|MCI|~~~~~~|A|---|B|---|C|---|D|---|E|Source ---|MCI|------|A|---|B|---|C|---|D|---|E|--- Receiver +---+ +-+ +-+ +-+ +-+ +-+\ / \ / \ / \ /+ + + + + + + + +-+ +-+ |J| |K| +-+ +-+ Figure 1: Remote failure exampleAs an example, consider Figure 1. IfSuppose that the link between node Afails,and B failed, B is directly connected and will detect the failure locally. In this case, node B is the only node that detects the failurelocallyandtriggerswill originate aDTNP (towards C).DTN to its downstream repair node C. Node C will receive the DTN for the UMH that is the primary UMH. Following rule 1 (Section 3.2), node C will make the backup UHM the new primary. No further action is needed because C has repaired the tree via node J. Note, J would not have sent a DTN to node C because J is not directly connected to the failing link. Suppose that node A fails, B and J are directly connected and detect the failure locally. A DTN packet is triggered to first downstream repair node of A, which is node C. Node C is an unusable Repair Node because it will receivethe DTNP fromDTN for both the primary UMH (from B) and the secondary UMH (from J).Because nodeFollowing rule 3 (Section 3.2), Cis notcan't repair the tree and must sent a new DTN packet towards the Repairnode itNodes of C, which are D, on the primary path, and E, on the secondary path. Suppose that the link between A and the MCI failed. Node A is directly connected to the failure and willforwardtrigger a DTN packet to its downstream repair node(s). In this case, node A has learned about theDTNP towards Kdownstream repair node C twice, the primary UMH (via node B) andD (observing rule 3.). K does not havesecondary UMH (via node J). Node C will therefore sent a DTN packet including both the primary and secondary UMH to node C (see Section 3.7 forthis tree, so it will senddetails on theDTNP downstreamencoding). Following rule 3 (Section 3.2), C can't repair the tree and must sent a new DTN packet towards the Repair Nodes of C, which are D, on the primary path, and E, on the secondary path. The DTN packet that D received from C will match against the primary UMH. Following rule 1, D will activate the backup path to I. The DTN packet that E(rule 2.).received from C will match against the backup UMH, following rule 2, no action is taken. In the example one can see that we recovered from the failure because node D started accepting the data packets from node I and is forwarding them to node E. 3.3. Repair Node discovery In example Figure 1 we wrote that nodes C, Dhasand E are the repair nodes. How does asecondary UMH, sonode determine that itappliesis a Repair Node? The rule1.is straightforward, a node that is enabled to join two UMH's, one in active the other in backup ([I-D.karan-mofrr]), is a repair node on the tree. A Repair node has the ability to repair the tree for the nodes upstream from this node. In order for the Repair NodeE applies rule 4. Asto get notified of upstream failures (ie DTN), the nodes upstream from the Repair Node need to learn about it. 3.3.1. Repair Node Information item A Repair Node MUST advertise its own address (either aresult, subscribers sitting atrouter ID orbelowany directly connected address) and an UMH identifier to the nodesDupstream on the tree. This address andEUMH are part of the RNI (Repair Node Information) item that is included in the JM. The RNI is carried hop by hop in the JM upstream. If a node along the path is not a Repair Node, it willcontinue receivingsave themulticast traffic. 4.RNI and forward if further upstream. If the node is Repair Node, it will save the RNI and include its own RNI in the JM sent further upstream. If a Repair Node changes one if its UMH's, it needs to trigger a new RNI to its upstream node(s) to notify them of the changed UMH. If a RNI is received and it does not match the saved RNI, the new RNI overrides the old RNI and triggers a JM with the new RNI to its upstream node(s). A RNI includes protocol specific information on how to identify the tree and UMH, for that reason it is documented in the protocol specific sections Section 4 and Section 5. The Repair Node MAY include additional information in the RNI for reasons of security and robustness, please see Section 3.6 and Section 3.7.1. 3.4. Reduce the bandwidth consumption infailure-free networknetworks with fast failover response times In some of networks, such as aggregation networks, bandwidth is more sparse than, e.g., in core networks. Live-live multicast protection results intraffic duplicationmore bandwidth consumption in thefailure-freenetwork as it continuouslyuses bandwidth forpulls traffic on bothtrees or segments.trees. In such networks it is relevant if the capacity serving backup purposes can beused in the failure-free network, i.e.,used, most of the time, bybest- effortbest-effort or even by lower-than-best-effort traffic. +---+ +-+ +-+ |MCI|~~~~~~|A|---|B| +---+ +-+ +-+ \\ // \\ // +-+ |C| +-+ Nodes A and B have receivers. Double lines show bandwidth consumption that is superfluous when there is no failure in the network. Figure 2: Example for secondary segments occupying bandwidth in MoFRR In live-standby mode the aim is that the secondary treeor secondary tree segments areis notloaded withforwarding multicast traffic as long as there is no failure.AIn order to achive such a "live-standby"type ofmulticast protectionmethod, however, requires two principal components: o Blocking OIFs at branching points inthesecondary tree to avoid sending secondary packets in the first place; and o Simple and fast-enough procedures tofollowing requirements must beable to activate the standby tree or standby tree-segment. 4.1. Upstream Tree Notifications The UTN mechanism requires that the secondary tree or tree segment was built with dedicated backup status. In MoFRR or MRT live-live mode the secondary tree and tree segments are active, only the merge point, i.e. the Repair Node, keeps the secondary incoming interface blocked. Dedicated backup status means that the OIFs corresponding to the secondary tree are installed into the data plane but they are installed with a flag denotingmet: o Upsteam nodes block their OIF when they areblocked. Packets are not forwarded to these interfaces unless an Upstream Tree Notification Packet (UTNP) activates them. Sending notifications upstream helps facilitating live-standby mode insteadpart oflive-live. Wheneveranode detects a failure onstandby tree. o If all of theprimary tree (the failure being upstream fromOIF's of thenode's location), a UTNP SHOULD be sent upstream towardsnode are marked as blocking, thesource onnode joins thesecondarytreesegment. It is to be notedin blocking mode further upstream. o A procedure so that thereception of a DTNP MAY be used as anupstreamfailure indication, so it MAY trigger sendingnode can quickly unblock its OIF and starts to forward. 3.4.1. Joining aUTNP. The UTNP activates thesecondary treesegments at branching nodes, i.e., unblocks the secondary OIFs. Both the secondaryin blocking mode The JMandsent to theUTNP go upsecondary UMH includes an identifier to indicate thetree until a branching node is reached. The branching node is o in a single topology environment: aupstream nodethat is partMUST not forward packets down this branch of theprimary tree and that also has a secondary leg; or o the MCI. 4.2. Joining a tree in dedicated backup statustree. Thesecondaryidentifier is TBD. The mechanism to joinprocessa secondary path isalmostidentical to what the MRT and MoFRR drafts describe,i.e.,i.e. arepair nodeRepair Node simply sends a secondary JM through another UMH (on another topology, in case of MRT).For UTN, the secondary JM, however, has to explicitly indicate the intended dedicated backup status. The backup indication MUST be an opaque and transitive indication, so that legacy nodes transparently keep the indication when sending the backup JM further up. In the following, such a JM will be called as "backup JM". How a JM may indicate its secondary status is protocol specific and will be discussed in the appropriate chapter below. 4.2.1. Single topology environment InIf asingle topology environment (MoFRR), the repairnodesends the secondary backup JM through a second UMH of its choice. From that UMH on, the backup JM is routed towards the source as if it was a regular JM. In every node, the backup JM MUST be processed identically toreceives aregularJM(including addingwithout anew entry to theblocking identifier for an OIFlist), but,that previously was inaddition,blocking mode, theadded OIF MUST be marked with "blocked" flag. Traffic MUST NOT be forwarded throughblocking mode is reset and the node stats forwarding out of thisinterface forinterface. If thismulticastnode joined the treewhileinblocked status. If a node receives a primary JM after receivingblocking mode further upstream, asecondarynew JMfrom the same neighbor, the nodeMUSTreset the corresponding OIF entrybe originated to"unblocked" state. Furthermore,reset theprimary JM MUST be sentblocking state furtherupwards if the node had no other "unblocked" OIFs, i.e., if the node has not received a primary JM from any other neighbor for the given multicast tree. 4.2.2. Multi-Topology Environmentupstream. 3.4.2. Upstream Tree Notifications Ina multi-topology environment (MRT), the secondary tree is built completely independent of the primary tree, on a second topology. This topology ID is attachedorder tothe backup JM. Not only the repair node, but each followingmake an upstream nodereceiving the backup JM will route the backup JM towards the sourcestart forwarding on thesecond topology. The dedicatedbackupindication MUST be separated from the topology ID, i.e.path quickly after alegacy node could send JMs on the secondary topology but will not set the dedicated backup flag. 4.3. Activation UTNP SHOULD be originated when an upstreamfailurehas beenwas detected on the primarymulticast tree and the node hasUMH, we sent asecondary UMH installed with stand-by status. Note thatUpstream Tree Notification (UTN) to the upstreamfailure may mean not onlynode on the(directly connected) UMH, but anybackup UMH. The failureup toon theMCI. Such an upstream failureprimary UMH may be local or detected using a DTN. The UTN received by the upstream node should be processed inseveral ways (out of scope). We note, however, thatthereceptiondata-plane and reset the blocking state ofa DTNP fromtheprimary UMH MAY be used as such a trigger. The UTNP activatesOIF. If this node also joined theblocked OIF on which it was received. The UTNP istree in blocking mode upstream, a UTN has to be forwardedupfurther upstream. This procedure is repeated until we find abranchingnode that isreached, which discardsnot in blocking mode or we reached theUTNP and starts forwarding multicast traffic onMCI. When theleg from whereupstream node resets theUTNP was received (e.g., after unblockingblocking mode in therespective OIF). Ifdata-plane, the control plane will still have the blocking mode set. In order for the control plane to get in sync with the data-plane, thebranchingnodedoes not consider itselfthat originated the UTN MUST also trigger areliable forwarder ofJM without blocking mode. The upstream node receiving themulticast traffic ofUTN must be able to identify theindicatedtree(e.g., it received a failure indication inwhich theform of a DTNP), it alsonotification is sent for, as well as the downstream interface it applies to. The information is encoded in aUTNP after receivingsame RNI item thatindicationis used for DTN packets. For details please see the protocol specific sections Section 4 and Section 5. Like DTN packets, UTN packets are sent via unicast toits secondary UMH, given it had one. 4.4.the upstream node. 3.5. MRT/MCI-Only Mode If each node in the network supports UTN and also all nodes support MRT, the nodes may work in "MRT/MCI-only" mode. In MRT/MCI-only mode, there is one singlebranching pointRepair Node for all failures, the MCI. Other nodes MUST NOT consider themselves asbranching nodes.Repair Nodes. MRT ensures the necessary maximally disjoint secondary tree up to the MCI, on a second topology. Only the MCI MUST keep its OIFs corresponding to the secondary tree blocked. Similarly, only MCEs MUST keep their secondary backup IIFs blocked. Any other nodes MUST NOT block their (secondary) IIFs or OIFs. In MRT/MCI-only mode, the UTNP MUST be forwarded directly to the MCI.TheThis mode enables that a node detecting a downstream failure of the primary tree MAY send a UTNP upstream towards the source/MCI on the primary tree. If an UTNP is received by the MCI on the secondary topology in "MRT/ MCI-only" mode, the MCI MUST unblock the OIF where the UTNP was received. This activates a whole sub-tree of the secondary tree. If an UTNP is received by the MCI on the primary topology in "MRT/ MCI-only" mode, the MCI gets no information on which leg to activate on the secondary tree, so it MUST activate (unblock) all secondary legs.5.3.6. TN Authentication If a malicious attacker can reproduce the TN packet format, unwanted reconvergence can be triggered. In order to avoid such attack, a TN packet MAY contain a digital signature. Having authentication is optional, it can be enabled or disabled in the network. If however security is enabled, all the nodes must share the same secret key, which they get either by configuration or from the multicast routing protocol. Moreover, for protection against reply attacks, each TN packet must contain a sequence number. The sequence numbers in the network are not necessarily synchronised, instead, each node can have its own. Sequence numbers can be generated arbitrarily, it can be even some random value; the only requirement is to create a new sequence number each time a reconvergence was triggered due to a TN (i.e. the sequence number was used). The originator of the DTN packet MUST use the sequence number of the Repair Node to create a TN signature TLV (see Section 3.7.1.2). For UTN packet the sender MUST use its own sequence number, what it sent previously to its UMH. The destination in this case must check validity based on the sequence number of the sender. A sequence number is learned from JM and part of the RNI. It is the responsibility of multicast routing protocol to protect JM against malicious change. 3.7. The TN Packet5.1.3.7.1. TN Packet Format A Tree Notification isaan IPv4 or IPv6 UDP packet with the following format. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | VersionNumberNr |Message TypeAddress Family |FlagsType | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Originator ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TreeInfo Count | TreeInfo size | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TreeInfo item - 1 | ~ . ~ | TreeInfo item - n | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TN option TLVs ... | . . . . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Version number: This is a21 octet field encoding the version number, currently 0.Message type:Address Family: This is a 2 octet field encoding a value from ADDRESS FAMILY NUMBERS in [RFC3232] that encodes the address family for the Root Address of the tree. Type: This is a 1 octet field encoding the message type, currently two are defined; Type 0: Downstream Tree Notification. Type 1: Upstream Tree Notification.Flags: A 1 octet field encoding the flags, currently no flags are defined, set to zero on send, ignored when received.Originator ID: 4 bytes long unique ID of the originator. That can be some loopback IPv4 addressownedif there is such, or can be set by theof the TN originator.operator. Sequence Number: Numberstartingunique for each failure case. It is recommend to start at 0, and to be increased by 1 each time a new TN is originated. The Sequence number may differ at each node, thus the sender and the receiver must know the same sequence number. TreeInfo count: 2 octet field encoding the number of TreeInfo items includes. TreeInfo size: 2 octet field encoding the number of octets use to encode the TreeInfo's following. TreeInfo item: The encoding of this field is protocol specific, see Section 4 and Section 5. TN option TLVs: TLVs (Type-Length-Valuetuples).tuples) describing additional options for TN packets. The TLV's have the following format. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value | . . . . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type: This is a 2 octet field encoding the type number of the TLV. Length: This is a 2 octet field encoding the length of the Value in octets. Value: String of Length octets, to be interpreted as specified by the Type field.5.1.1.3.7.1.1. TN TimeStamp TLV Format The TimeStamp is an optional TLV that MAY be included when the TN was originated, it has the following format. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 0 | Length = 8 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TimeStamp Sent (seconds) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TimeStamp Sent (microseconds) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ TimeStamp: The TimeStamp is the time-of-day (in seconds and microseconds, according to the sender's clock) in NTP format [NTP] when the Tree Notification is sent.5.2. Origination of3.7.1.2. TNPacketsSignature TLV Format TNpackets SHOULDSignature is an optional TLV, which protects the whole TNP (including other TLVs) against attacks thus it must bepre-loaded tothedata plane cards, e.g. to a buffer, so thatlast TLV if present. The signature is SHA-512 hash value. The input of the hash function is as follows: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Complete packetonly needs to be flushed when needed. This minimizescontent without signature TLV | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Secret key | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Signature input: The input of theincurred delay. One TN packet MUST be sent per affected multicast tree. This does not lead to a scalability problem in practical network deployments, where ithash function isnot expected that a node has to send more than a few 1000sthe packet extended with TN security key The build up of the TLV is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = 1 | Length = 64 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Hash function result | . . . . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Signature: SHA-512 signature protecting TN packets.6. IP/PIM4. PIM Specific TN ComponentsThe TN UDP datagram is encapsulated in an IP packet with (S,G) set as sourceIn this section we are documenting the PIM specific data-structures anddestination inprocedures (if they are different from theIP header. Such ageneric procedures are defined in this document). As described in this document, TNpacket is originated for each affected (S,G) multicast tree.packets are UDP/IP packets sent via unicast to its destination. The UDPportnumberport number for PIM is set toan IANAthe (to be) assigned IANA port number for PIM-TN. 4.1. RNI item in PIMTN. 6.1. IP/PIM Downstream Tree NotificationsJoin Message Asexplained before, DTNP is multicasted on each tree on each outgoing interface (including potential "standby" OIFs). If a node is a potential repair node for a multicast tree,described previously, PIM must insert theIP forwarding engine MUST be programmed so that it monitors DTNP packets, which areRNI when sending a PIM join to its UMH. The RNI includes its router ID, sequence number and UMH Identifier. The UMH-ID can berecognized among the (S,G) normal data packets basedlocally unique identifier since its has only local significance ontheir UDP port number. If a DTNP is recognized,theaffected tree canRepair Node. A good ID to use would beidentified fromthe IPheader's source and destinationaddressfields. As noted in Section 3.2, nodes MUST NOT forward DTNP outsideof theoperator domain. I.e., nodes egressinginterface associated with the UMH thedomain MUST filter and discard DTNP packets on their egress interfaces. The DTN mechanism does not require any update ofPIMrelated specifications. 6.2. IP/PIM Upstream Tree Notifications An originated UTNPjoin isto besentupstream to the secondary UMH, i.e., upstream through the secondary incoming interface.to. Theforwarding engine MUST be programmed so that despite the UTNP packet having (S,G)RNI is carried in theIP header, it MUST forwardPIM Join as a new PIM Attribute following [RFC5384]. The PIM RNI attribute has theUTNP packet upstream. (U)TN(P) packets are tofollowing format for IPv4. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |F|E| Type | Length | Sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Repair Node address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | UMH-ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ F Forward if not understood. E End of Attributes, following [RFC5384]. Type: This 6 bit field should berecognized based on their UDP port number. Only nodes that have installed some OIFs in blocked (backup) status need to keep monitoringassigned by IANA forUTNP packets.TN specific JOIN messages. Length: Length = 10 octets. Sequence number: 2 octets long field, describing the sequence number of the sending Repair Node. Repair Node address: TheUTN mechanism requires that, when a node performsrouter ID of the Repair Node, in IPv4 address format. UMH-ID: This is asecondary join,4 octet field encoding UMH identifier. This is the IPv4 address of the interface associated with the UMH the PIMJOIN message indicates its dedicated "standby" status. Such an indicationjoin isrequired so thatsent to. Figure 3: PIM IPv4 RNI attribute TLV The PIM RNI attribute has therecipientfollowing format for IPv6. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |F|E| Type | Length | Sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Repair Node address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ UMH-ID ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ F Forward if not understood. E End ofa standby PIMAttributes, following [RFC5384]. Type: This 6 bit field should be assigned by IANA for TN specific JOINcan recognise that it can install its interface, through whichmessages. Length: Length = 16 octets. Sequence number: 2 octets long field, describing thestandby PIM JOIN was received, intosequence number of theOIF listsending Repair Node. Repair Node address: The router ID of the Repair Node, inblocked state. (A received UTNP could be one trigger to unblock suchIPv4 address format. UMH-ID: This is abackup OIF.) An extension of PIM JOIN messages and mechanisms16 octet field encoding UMH identifier. This is theresponsibilityIPv6 address of the interface associated with the UMH the PIMWG. Itjoin isto be notedsent to. Figure 4: PIM IPv6 RNI attribute TLV 4.2. Tree Information Item A TN packet contains one or more TreeInfo items that allows asecondary status indication has already been proposedMerge Node to idenfy which tree(s) and interface(s) are effected by theIETF in [I-D.liu-pim-single-stream-multicast-frr]. 6.3. Incremental deploymentTN. TheDTNP can be forwarded by legacy nodes as a data packet. Sosame encoding is used for DTNcan be deployed incrementally if the failure detecting nodeandrepair nodes support it. In case of UTN,UTN packets. The PIM TreeInfo items are defined for IPv4 and IPv6. Which version is to be included in the(S,G) addressed (U)TN(P)TN packet depends on Address Family in the TN packet. The UMH-ID included in the DTN MUST beforwarded towards to source, upstream. Thistaken from the RNI that was signalled for that tree. The UMH-ID for UTN packets isin contrast tothenormal forwarding proceduresPIM neighbor address for(S,G) packets. This meansthatlegacy nodes cannot forward such packets. It remains to be studied iftree. The TreeInfo item has theUTNP packet can befollowing format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv4 Source address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv4 group address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | UMH-ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Source Address: This is aunicast packet sent towards4 octet field encoding the IPv4 sourceor MCI, or if the UTNP packet can be tunneled through legacy nodes. In the current versionaddress of thespec, legacy nodes cannot handle UTNP. As a consequence, a node supportingtree. A source address of 0.0.0.0 means that thisspec MUST NOT send dedicated backup JOIN messagesTN relates to alegacy node. Detecting(*,G) tree. Group Address: This is a 4 octet field encoding thecapabilityIPv4 group address ofsupporting Tree Notifications can be done via capability advertisement. This should be specified bythePIM WG. As an indication, ittree. UMH-ID: This islikely thata"TN-Capable" PIM-Hello option needs to be standardized. 7. mLDP Specific TN Components Since MPLS4 octet field encoding UMH identifier. Figure 5: PIM IPv4 TreeInfo item 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ IPv6 Source address ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ IPv6 group address ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ UMH-ID ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Source Address: This isused as transport technology, the UTN and DTN are forwarded up and downa 16 octet field encoding theLSP using MPLS encapsulation. The MPLS label pushed ontoIPv6 source address of the tree. A source address of 0:0:0:0:0:0:0:0 means that this TN relates to a (*,G) tree. Group Address: This is a 16 octet field encoding thelabel associated with the MP LSP impacted by the failure. This follows moreIPv6 group address oflessthesame mechanism as described in [RFC4379]. Its important that a TN packettree. UMH-ID: This isnever IPa 16 octet field encoding UMH identifier. Figure 6: PIM IPv6 TreeInfo item 4.3. Incremental deployment Joins with a RNI can be forwardedwhenthrough legacy nodes if thetail ofTransitive Attribute (see [RFC5384]) has theMP LSPF bit set to 1. It isreached. In orderup toprevent IP forwarding,thedestination address MUST be setnetwork operator toan address fromdetermine this. The DTN functionality can be deployed incrementally as long as the127/8 range for IPv4node detecting the failure andthat same range embeddedRepair Nodes support it. 5. mLDP Specific TN Components In this section we are documenting the mLDP specific data-structures and procedures (if they are different from the generic procedures are defined inas IPv4-mapped IPv6 address. The source addressthis document). As described inthe IP header MUST be set to an address localthis document, TN packets are UDP/IP packets sent via unicast tothe router.its destination. The UDP port number for mLDP is set toan IANAthe (to be) assigned IANA port number for mLDP-TN. 5.1. RNI item in mLDPTN. 7.1.Label Mapping The RNI item for mLDPDownstream Tree Notification 7.1.1. Originatingis encoded in aDTNP AsLDP MP Status TLV as documented in [RFC6388] sectionSection 3.1, a Downstream Tree Notification is sent by a router that detects a failure of an upstream link or node. The DTN packet is then sent to each5. A new LDPneighbor in the Outgoing Interface List for eachMPLSP impact byStatus Value Element is created for this purpose and called thefailure usingRNI Status. The RNI Status includes theMPLS Label that this neighborrouter ID, sequence number and UMH Identifier. The UMH-ID can be locally unique identifier since its hasassigned for that MP LSP. 7.1.2. Receiving a DTNP A Downstream Tree Notification Packet is received inline with the dataonly local significance ona particular LSP. Ifthereceiving router is aRepairNode,node. For mLDP theMPLS forwarding logic will monitorvalue that MUST be used is theMPLS packets in order to detectLocal Label associated with theDTN packet based onUMH theUDP port number assigned formLDPTN. When a DTNPLabel Mapping isdetected, the outer MPLS label identifies the LSP. No additional mechanism or lookups are needed here.sent to. TheMPLS forwarding code can immediately activate the standby upstream pathRNI status is carried in Label Mapping messages anddisablehas theold primary pathfollowingthe procedures described in Section 3.2 7.1.3. Forwarding a DTNP If a router is not aformat. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RNI | Length | Seq. Number . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . | IPv4 Repair Node address . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . | UMH-ID reserved | UMH-ID Label . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . | +-+-+-+-+-+-+-+-+ RNI Type: This 1 octet field assigned by IANA for RNI Status Value Element Types. Length: This is aparticular LSP it does not need to monitor2 octet field, describing theincoming traffic for that LSP in order to detectlength of theDFN packet. Such a router will just forwardValue, Length = 10 octets. Sequence number: 2 octets long field, describing theDTN packet downsequence number of theLSP as normal data. Also, routers that don't support DTN processing will always just forwardsending Repair Node. IPv4 Repair Node address: The IPv4 address of the Repair Node. UMH-ID reserved: 12 bit field, reserved. UMH-ID Label: This is aDTN packet20 bit field encoding a Label asnormal data. For the network to benefit from this feature, not all routers need to be DTN capable. 7.2.UMH identifier. Figure 7: mLDPUpstreamRNI Status Value Element 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RNI | Length | Status code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ MBB Type: Type 1 (to be assigned by IANA) Length: 1 Status code: 1 = MBB request 2 = MBB ack 5.2. TreeNotification 7.2.1. OriginatingInformation Item A TN packet contains one or more TreeInfo items that allows aUTNP Following the procedures as described in Section 4.1, an UTNP MAY needMerge Node tobe originatedidentify which tree(s) andsent to an upstream LDP neighbor. A P2MP LSP has no upstream labeled path to reachinterface(s) are effected by theroot because a P2MP LSPTN. The same encoding isunidirectional. In orderused for DTN and UTN packets. Following [RFC6388], mLDP will assign a unique Label tocreate aneach upstreampath that follows the P2MP LSP allnode per MP-LSP. This label identifies theway up towardsUMH AND therootLSP. Since weapply the proceduresaredocumented in [I-D.ietf-mpls-mldp-hsmp]. A MP2MP LSP already has an upstream path to the root of the tree, however, these packets are also forwarded down the tree by other LSRs. There are two possible approuches, an LSRs that receivedusing aDTNP on an upstream interface may just chooselabel toignore these packets, or an LSR may filter out DTNP packets from ever being forwarded down the tree. More details will be added in later revisions ofidentify thedraft. 7.2.2. Receiving a UTNP An Upstream Tree NotificationUMH and LSP, there isreceived on the upstream path associated with the MP LSP by node U. If router U has a downsteam interface in that MP LSPs OIF list that was joined in standby, it will move that interfaceno need toforwarding.define a IPv4 and IPv6 specific encoding. Theouter labelLabel included in theMPLS header will identify the MP LSP that is targeted. However, that does not necessarily identify the downstream LDP neighbor and interface that needs toDTN MUST beput in forwarding state. Following the procedures in [I-D.ietf-mpls-mldp-hsmp] node U MAY assign all the downstream LDP neighbors the same label for the upstream path. Fortaken from thepurpose of UTN, node U MUST assign a unique labelRNI that was signalled foreach downstream LDP neighbor. Ifthat tree. The Label for UTN packets isunique, the UTNP will identifytheMP LSP and the downstream LDP neighbor. Since node ULocal Label that was allocated for that tree. The TreeInfo item hasselectedthedownstream interface, it knows which interface to put in forwarding mode. 7.2.3. Forwardingfollowing format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | UMH-Label | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Reserved: This is aUTNP A UTNP has12 bits filed, set tobe forward upstream towards the rootzero on sending, ignored when received. UMH-Label: This is a 20 bit field encoding MPLS Label of theMP LSP following the procedures as defined in Section 4.3 8.UMH. Figure 8: mLDP TreeInfo item 6. Acknowledgements The authors would likeexpress their thanks for Gabor Enyedi for initial discussions. The authors would also liketo thank StefanOlofsson andOlofsson, Javed Asghar and Greg Sheperd forcommentingtheir comments on the draft.9.7. IANA Considerations IANA is requested to allocate UDP port numbers to TN messages. One port number for TN in IP/PIM context, and another one for MPLS/mLDP context. The separation of UDP port numbers between IP and MPLS is requested to prevent problems when a PIM multicast tree is transported partly through an mLDP multicast tree.10.IANA is requested to allocate a value from "PIM Join Attribute" to make routers capable to advertisement their Tree Notification capability. IANA is requested to allocate a value from "PIM Join Attribute Types" for TN's join command extra information. A new IANA registry is needed for "TN option TLVs". This describes the types of TLVs containing extra options for TN messages. 8. Security Considerations Two types of security problems can be foreseen by the authors: o Handling illegally injected TN packets o Handling replay attacks (re-injecting previous TN messages) o TN messages propagating outside an operator's domain Illegal TN packets can behandleddetected with authenticationchecks.check. Providing authentication for TN messageswill be consideredis described inlater revisions of this spec.Section 3.6. Prevention of replay attacks needs authentication in combination with sequencenumbering.numbering, which is also described at the same section. Preventing TN messages that travel inline with data packets MUST be solved by nodes egressing the operator's domain. Solutions for IP and MPLS are described in sections Section64 and Section7,5, respectively.11.9. References11.1.9.1. Normative References[I-D.ietf-mpls-mldp-hsmp] Jin, L., JOUNAY, F., Wijnands, I., and N. Leymann, "LDP Extensions for Hub & Spoke Multipoint Label Switched Path", draft-ietf-mpls-mldp-hsmp-00 (work in progress), September 2012. [I-D.ietf-rtgwg-mrt-frr-architecture] Atlas, A., Kebler, R., Envedi, G., Csaszar, A., Konstantynowicz, M., White, R., and M. Shand, "An Architecture for IP/LDP Fast-Reroute Using Maximally Redundant Trees", draft-ietf-rtgwg-mrt-frr-architecture-01 (work in progress), March 2012.[I-D.karan-mofrr] Karan, A., Filsfils, C., Farinacci, D., Decraene, B., Leymann, N., and W. Henderickx, "Multicast only Fast Re- Route", draft-karan-mofrr-02 (work in progress), March 2012.11.2.[RFC5384] Boers, A., Wijnands, I., and E. Rosen, "The Protocol Independent Multicast (PIM) Join Attribute Format", RFC 5384, November 2008. [RFC6388] Wijnands, IJ., Minei, I., Kompella, K., and B. Thomas, "Label Distribution Protocol Extensions for Point-to- Multipoint and Multipoint-to-Multipoint Label Switched Paths", RFC 6388, November 2011. 9.2. Informative References [I-D.atlas-rtgwg-mrt-mc-arch] Atlas, A., Kebler, R., Wijnands, I., Csaszar, A., and G. Envedi, "An Architecture for Multicast Protection Using Maximally Redundant Trees",draft-atlas-rtgwg-mrt-mc-arch-00 (work in progress), March 2012. [I-D.liu-pim-single-stream-multicast-frr] Liu, H., Zheng, L., Bai, T., and Y. Yu, "Single Stream Multicast Fast ReRoute (SMFRR) Method", draft-liu-pim-single-stream-multicast-frr-01draft-atlas-rtgwg-mrt-mc-arch-01 (work in progress),October 2010.February 2013. Authors' Addresses IJsbrand Wijnands (editor) Cisco De kleetlaan 6a Diegem, 1831 Belgium Phone: Email: ice@cisco.com Luc De Ghein Cisco De kleetlaan 6a Diegem, 1831 Belgium Phone: Email: ldeghein@cisco.com Gabor Sandor Enyedi (editor) Ericsson Konyves Kalman Krt 11/B Budapest, 1097 Hungary Phone: Email: Gabor.Sandor.Enyedi@ericsson.com Andras Csaszar(editor)Ericsson Konyves Kalman Krt 11/B Budapest, 1097 Hungary Phone: Email: Andras.Csaszar@ericsson.com Jeff Tantsura Ericsson 300 Holger Way San Jose, California 95134 USA Email: Jeff.Tantsura@ericsson.com