| < draft-ietf-idr-bgp-autoconf-considerations-00.txt | draft-ietf-idr-bgp-autoconf-considerations-01.txt > | |||
|---|---|---|---|---|
| Network Working Group R. Bush | Network Working Group R. Bush | |||
| Internet-Draft Arrcus, Inc. & Internet Initiative Japan | Internet-Draft Arrcus, Inc. & Internet Initiative Japan | |||
| Intended status: Informational J. Dong | Intended status: Informational J. Dong | |||
| Expires: September 9, 2021 Huawei Technologies | Expires: 27 December 2021 Huawei Technologies | |||
| J. Haas, Ed. | J. Haas, Ed. | |||
| Juniper Networks | Juniper Networks | |||
| W. Kumari, Ed. | W. Kumari, Ed. | |||
| March 8, 2021 | 25 June 2021 | |||
| Requirements and Considerations in BGP Peer Auto-Configuration | Requirements and Considerations in BGP Peer Auto-Configuration | |||
| draft-ietf-idr-bgp-autoconf-considerations-00 | draft-ietf-idr-bgp-autoconf-considerations-01 | |||
| Abstract | Abstract | |||
| This draft is an exploration of the requirements, the alternatives, | This draft is an exploration of the requirements, the alternatives, | |||
| and trade-offs in BGP peer auto-discovery at various layers in the | and trade-offs in BGP peer auto-discovery at various layers in the | |||
| stack. It is based on discussions in the IDR Working Group BGP | stack. It is based on discussions in the IDR Working Group BGP | |||
| Autoconf Design Team. The current target environment is the | Autoconf Design Team. The current target environment is the | |||
| datacenter. | datacenter. | |||
| This document is not intended to become an RFC. | This document is not intended to become an RFC. | |||
| skipping to change at page 1, line 49 ¶ | skipping to change at page 1, line 49 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 9, 2021. | This Internet-Draft will expire on 27 December 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | license-info) in effect on the date of publication of this document. | |||
| publication of this document. Please review these documents | Please review these documents carefully, as they describe your rights | |||
| carefully, as they describe your rights and restrictions with respect | and restrictions with respect to this document. Code Components | |||
| to this document. Code Components extracted from this document must | extracted from this document must include Simplified BSD License text | |||
| include Simplified BSD License text as described in Section 4.e of | as described in Section 4.e of the Trust Legal Provisions and are | |||
| the Trust Legal Provisions and are provided without warranty as | provided without warranty as described in the Simplified BSD License. | |||
| described in the Simplified BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Design Team Determinations . . . . . . . . . . . . . . . . . 3 | 2. Design Team Determinations . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. Problem Scope . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Problem Scope . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Simplicity . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.2. Simplicity . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.3. BGP Auto-Discovery Protocol State Requirements . . . . . 3 | 2.3. BGP Auto-Discovery Protocol State Requirements . . . . . 3 | |||
| 2.3.1. BGP Session Transport State . . . . . . . . . . . . . 4 | 2.3.1. BGP Auto-Discovery Protocol State . . . . . . . . . . 4 | |||
| 2.3.2. BGP Session Protocol State . . . . . . . . . . . . . 4 | 2.3.2. BGP Session Protocol State . . . . . . . . . . . . . 4 | |||
| 2.4. BGP Auto-Discovery Protocol Transport Requirements . . . 5 | 2.4. BGP Auto-Discovery Protocol Transport Requirements . . . 4 | |||
| 2.5. Operator Configuration . . . . . . . . . . . . . . . . . 5 | 2.5. Operator Configuration . . . . . . . . . . . . . . . . . 5 | |||
| 3. Design Principle Considerations . . . . . . . . . . . . . . . 6 | 3. Design Principle Considerations . . . . . . . . . . . . . . . 5 | |||
| 3.1. Transport Considerations . . . . . . . . . . . . . . . . 6 | 3.1. Transport Considerations . . . . . . . . . . . . . . . . 5 | |||
| 3.2. Auto-Discovery Protocol Timing Considerations . . . . . . 6 | 3.2. Auto-Discovery Protocol Timing Considerations . . . . . . 6 | |||
| 3.3. Relationship with BGP . . . . . . . . . . . . . . . . . . 7 | 3.3. Relationship with BGP . . . . . . . . . . . . . . . . . . 6 | |||
| 3.4. Session Selection Considerations . . . . . . . . . . . . 7 | 3.4. Session Selection Considerations . . . . . . . . . . . . 6 | |||
| 3.5. Operational Trust Considerations . . . . . . . . . . . . 7 | 3.5. Session Stability Considerations . . . . . . . . . . . . 7 | |||
| 3.6. Error Handling Considerations . . . . . . . . . . . . . . 9 | 3.6. Operational Trust Considerations . . . . . . . . . . . . 7 | |||
| 3.7. Error Handling Considerations . . . . . . . . . . . . . . 9 | ||||
| 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 | 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | 5. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | |||
| 5.1. BGP Transport Security Considerations . . . . . . . . . . 10 | 5.1. BGP Transport Security Considerations . . . . . . . . . . 10 | |||
| 5.2. Auto-discovery Protocol Considerations . . . . . . . . . 10 | 5.2. Auto-discovery Protocol Considerations . . . . . . . . . 10 | |||
| 5.2.1. Potential Scopes of an Auto-discovery Protocol . . . 10 | 5.2.1. Potential Scopes of an Auto-discovery Protocol . . . 10 | |||
| 5.2.2. Desired Security Properties of the Auto-discovery | 5.2.2. Desired Security Properties of the Auto-discovery | |||
| Protocols . . . . . . . . . . . . . . . . . . . . . . 11 | Protocols . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11 | 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 12 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 12 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 12 | 7.2. Informative References . . . . . . . . . . . . . . . . . 12 | |||
| Appendix A. Analysis of Candidate Approaches . . . . . . . . . . 14 | Appendix A. Analysis of Candidate Approaches . . . . . . . . . . 14 | |||
| A.1. BGP Peer Discovery at Layer Two . . . . . . . . . . . . . 14 | A.1. BGP Peer Discovery at Layer Two . . . . . . . . . . . . . 14 | |||
| A.1.1. LLDP based Approach . . . . . . . . . . . . . . . . . 14 | A.1.1. LLDP based Approach . . . . . . . . . . . . . . . . . 15 | |||
| A.1.2. L3DL based Approach . . . . . . . . . . . . . . . . . 15 | A.1.2. L3DL based Approach . . . . . . . . . . . . . . . . . 15 | |||
| A.2. Link-Local Discovery . . . . . . . . . . . . . . . . . . 15 | A.2. Link-Local Discovery . . . . . . . . . . . . . . . . . . 16 | |||
| A.3. BGP peer Discovery at Layer Three . . . . . . . . . . . . 16 | A.3. BGP peer Discovery at Layer Three . . . . . . . . . . . . 16 | |||
| A.3.1. New BGP Hello Message based Approach . . . . . . . . 16 | A.3.1. New BGP Hello Message based Approach . . . . . . . . 17 | |||
| A.3.2. BGP OPEN Message based Approach . . . . . . . . . . . 17 | A.3.2. BGP OPEN Message based Approach . . . . . . . . . . . 17 | |||
| A.3.3. Bootstrapping BGP via BGP . . . . . . . . . . . . . . 17 | A.3.3. Bootstrapping BGP via BGP . . . . . . . . . . . . . . 18 | |||
| A.3.4. Bootstrapping BGP via OSPF . . . . . . . . . . . . . 18 | A.3.4. Bootstrapping BGP via OSPF . . . . . . . . . . . . . 18 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
| 1. Introduction | 1. Introduction | |||
| This draft is an exploration of the requirements, the alternatives, | This draft is an exploration of the requirements, the alternatives, | |||
| and trade-offs in BGP peer auto-discovery at various layers in the | and trade-offs in BGP peer auto-discovery at various layers in the | |||
| stack. It is based on discussions in the IDR Working Group BGP | stack. It is based on discussions in the IDR Working Group BGP | |||
| Autoconf Design Team. The current target environment is the | Autoconf Design Team. The current target environment is the | |||
| datacenter. | datacenter. | |||
| skipping to change at page 3, line 41 ¶ | skipping to change at page 3, line 41 ¶ | |||
| The auto-discovery mechanism is designed to be simple. | The auto-discovery mechanism is designed to be simple. | |||
| The goal is to select BGP Speakers where a BGP session may be | The goal is to select BGP Speakers where a BGP session may be | |||
| successfully negotiated for a particular purpose. The auto-discovery | successfully negotiated for a particular purpose. The auto-discovery | |||
| mechanism will not replace or conflict with data exchanged by the BGP | mechanism will not replace or conflict with data exchanged by the BGP | |||
| FSM, including its OPEN message. | FSM, including its OPEN message. | |||
| 2.3. BGP Auto-Discovery Protocol State Requirements | 2.3. BGP Auto-Discovery Protocol State Requirements | |||
| Tersely, the required state that MUST be carried by the BGP Auto- | The Auto-Discovery Protocol is used discover BGP Session end-points. | |||
| Discovery Protocol for a discovered session include: | In other words, enough information to for a BGP Speaker to initiate a | |||
| connection in the BGP protocol. | ||||
| BGP Session Transport State: | The BGP Session Properties, used by the discovering client to | |||
| determine acceptability of the discovered session, are "discovered at | ||||
| OPEN" by the client by initiating a BGP session with the discovered | ||||
| end-point. | ||||
| o IP addresses | The required state that MUST be carried by the BGP Auto-Discovery | |||
| o Transport security parameters | Protocol for a discovered session includes: | |||
| o GTSM [RFC5082] configuration, if any | ||||
| o BFD [RFC5880] configuration, if any | ||||
| BGP Session Protocol State: | * IP addresses | |||
| * Transport security parameters | ||||
| * GTSM [RFC5082] configuration, if any | ||||
| * BGP Session Protocol State Version Number | ||||
| o AS Numbers | BGP Session Protocol State, discovered at BGP OPEN: | |||
| o BGP Identifier | ||||
| o Supported AFI/SAFIs | ||||
| o Device Role | ||||
| Once this information has been learned, discovery has been completed. | * AS Numbers | |||
| The BGP Speaker has the necessary information to determine if it | * BGP Identifier | |||
| wishes to open a BGP session with the discovered BGP Speaker. It can | * Supported AFI/SAFIs | |||
| then then initiate a BGP session with the discovered BGP Speaker. | ||||
| 2.3.1. BGP Session Transport State | 2.3.1. BGP Auto-Discovery Protocol State | |||
| o Support for IPv4 and IPv6 address families, but do not assume that | * Support for IPv4 and IPv6 address families, but do not assume that | |||
| both are available. | both are available. | |||
| o The ability to use directly attached interface addresses, or the | * The ability to use directly attached interface addresses, or the | |||
| device's Loopback address. When using the Loopback address, | device's Loopback address. When using the Loopback address, | |||
| potentially exchange additional information to bootstrap | potentially exchange additional information to bootstrap | |||
| forwarding to that address. | forwarding to that address. | |||
| o Discovery of BGP transport protocol end-points and essential | * Discovery of BGP transport protocol end-points and essential | |||
| properties such as IP addresses, transport security parameters, | properties such as IP addresses, transport security parameters, | |||
| layer 3 liveness mechanisms such as BFD, and support for GTSM. | and support for GTSM. | |||
| o Transport security parameters include protocol - such as plain | * Transport security parameters include protocol - such as plain | |||
| TCP, TCP-AO [RFC5925], IPsec [RFC4301], TCP-MD5 [RFC2385] - and | TCP, TCP-AO [RFC5925], IPsec [RFC4301], TCP-MD5 [RFC2385] - and | |||
| necessary configuration for that protocol. Some example | necessary configuration for that protocol. Some example | |||
| considerations for this are represented in YANG Data Model for Key | considerations for this are represented in YANG Data Model for Key | |||
| Chains [RFC8177]. | Chains [RFC8177]. | |||
| * A version number representing when the BGP Session Protocol State | ||||
| has last changed. This can be used as a hint by an auto-discovery | ||||
| client to determine when the state has been updated from a prior | ||||
| version. This can reduce repeated connections from an auto- | ||||
| discovery client to the discovered BGP Speaker when information | ||||
| has not changed. | ||||
| 2.3.2. BGP Session Protocol State | 2.3.2. BGP Session Protocol State | |||
| o Discovery of BGP peer session parameters relevant to peer | * Discovery of BGP peer session parameters relevant to peer | |||
| selection such as Autonomous System (AS) Numbers, BGP Identifiers, | selection such as Autonomous System (AS) Numbers, BGP Identifiers, | |||
| supported address families/subsequent-address families (AFI/ | supported address families/subsequent-address families (AFI/ | |||
| SAFIs), and device roles. | SAFIs). | |||
| 2.3.2.1. BGP Auto-Discovery Device Role Requirements | ||||
| As part of peer selection, it may be necessary to understand the role | ||||
| of the discovered session to determine whether or not the BGP Speaker | ||||
| desires to establish a peering session. | ||||
| In some cases, role may be a clear function of the device in a | ||||
| deployment. An example of this is a discovered session for a BGP | ||||
| Clos fabric: The interface may for a leaf, the aggregation layer, or | ||||
| the spine layer. Even then, the type of fabric, what pod it belongs | ||||
| to and the peer type may be relevant information. | ||||
| Some types of device roles may be subject to standardization, such as | ||||
| BGP Clos fabrics. Flexibility to permit operators to use device | ||||
| roles for their own auto-configuration peer selection purposes is a | ||||
| requirement. | ||||
| Peering sessions may need to advertise that they are capable to be | ||||
| used for multiple roles. Thus, it is a requirement that the auto- | ||||
| discovery protocols permit advertising multiple roles in the same | ||||
| PDU. | ||||
| 2.4. BGP Auto-Discovery Protocol Transport Requirements | 2.4. BGP Auto-Discovery Protocol Transport Requirements | |||
| BGP Auto-Discovery Protocol State may be carried in multiple | BGP Auto-Discovery Protocol State may be carried in multiple | |||
| protocols operating in different transport layers. | protocols operating in different transport layers. | |||
| Implementations supporting more than one protocol for this state must | Implementations supporting more than one protocol for this state must | |||
| have a mechanism for consistently selecting discovered BGP sessions. | have a mechanism for consistently selecting discovered BGP sessions. | |||
| The BGP Identifier, which is carried by the BGP OPEN message, can | The BGP Identifier, which is carried by the BGP OPEN message, can | |||
| help detect sessions to the same BGP Speaker carried in multiple | help detect sessions to the same BGP Speaker carried in multiple | |||
| protocols. | protocols. | |||
| 2.5. Operator Configuration | 2.5. Operator Configuration | |||
| With BGP auto-discovery, some configuration of BGP is still needed. | With BGP auto-discovery, some configuration of BGP is still needed. | |||
| Operator configuration should be able to decide at least the | Operator configuration should be able to decide at least the | |||
| following: | following: | |||
| o Select or otherwise filter which peers to actually try to send BGP | * Select or otherwise filter which peers to actually try to send BGP | |||
| OPEN messages. | OPEN messages. | |||
| * Decide the parameters to use. For example: | ||||
| * Permit the matching of device role from the discovery protocol | - IP addressing: IPv4 or IPv6. | |||
| as part of peer selection. | - Interface for peering: Loopback, or Direct. | |||
| o Decide the parameters to use. For example: | - Any special forwarding or routing needed for reaching the | |||
| * IP addressing: IPv4 or IPv6. | ||||
| * Interface for peering: Loopback, or Direct. | ||||
| * Any special forwarding or routing needed for reaching the | ||||
| prospective peer; for example, loopback. | prospective peer; for example, loopback. | |||
| * AS numbering. | - AS numbering. | |||
| * BGP Transport Security Parameters. | - BGP Transport Security Parameters. | |||
| * BGP Policy that is appropriate for the type of discovered | - BGP Policy that is appropriate for the type of discovered | |||
| session. | session. | |||
| In addition to actually forming the BGP sessions, a common deployment | In addition to actually forming the BGP sessions, a common deployment | |||
| model may also be the so called "validation" model. In this model, | model may also be the so called "validation" model. In this model, | |||
| the operator configures the BGP sessions manually, and uses the | the operator configures the BGP sessions manually, and uses the | |||
| information collected/populated by the BGP Autoconf mechanism to | information collected/populated by the BGP Auto-Configuration | |||
| validate that the sessions are correct. | mechanism to validate that the sessions are correct. | |||
| 3. Design Principle Considerations | 3. Design Principle Considerations | |||
| This section summarizes the considerations of possible criteria for | This section summarizes the considerations of possible criteria for | |||
| the design of a BGP auto-discovery mechanism, which may need further | the design of a BGP auto-discovery mechanism, which may need further | |||
| discussion in a wider community than the design team; for example, | discussion in a wider community than the design team; for example, | |||
| the IDR Working Group. | the IDR Working Group. | |||
| 3.1. Transport Considerations | 3.1. Transport Considerations | |||
| The network layer of the discovery mechanism may impact the scoping | The network layer of the discovery mechanism may impact the scoping | |||
| of the deployment of the auto-discovery mechanism. | of the deployment of the auto-discovery mechanism. | |||
| o Layer 2: For example, based on Ethernet. | * Layer 2: For example, based on Ethernet. | |||
| o Layer 3: Which is generic for any link-layer protocol. | * Layer 3: Which is generic for any link-layer protocol. | |||
| Potentially leveraging existing protocols deployed in the data | Potentially leveraging existing protocols deployed in the data | |||
| center. | center. | |||
| The length of messages supported by the protocol. | The length of messages supported by the protocol. | |||
| How extensible the protocol is to carry future state for BGP auto- | How extensible the protocol is to carry future state for BGP auto- | |||
| configuration. | configuration. | |||
| 3.2. Auto-Discovery Protocol Timing Considerations | 3.2. Auto-Discovery Protocol Timing Considerations | |||
| skipping to change at page 6, line 40 ¶ | skipping to change at page 6, line 22 ¶ | |||
| Establishing a reasonable expectation for the timeliness of auto- | Establishing a reasonable expectation for the timeliness of auto- | |||
| configuration is desirable. When a link is plugged-in, one shouldn't | configuration is desirable. When a link is plugged-in, one shouldn't | |||
| have to wait minutes for potential peers to be discovered and BGP | have to wait minutes for potential peers to be discovered and BGP | |||
| session establishment attempted. For protocols crafted explicitly | session establishment attempted. For protocols crafted explicitly | |||
| for BGP auto-configuration, the time for discovery should be a | for BGP auto-configuration, the time for discovery should be a | |||
| reasonable amount of time; for example ten seconds or less. | reasonable amount of time; for example ten seconds or less. | |||
| Since discovery mechanisms may become very chatty when utilized by a | Since discovery mechanisms may become very chatty when utilized by a | |||
| number of devices on shared networks, the protocol should not impose | number of devices on shared networks, the protocol should not impose | |||
| undue burden on the devices on that network to process the discovery | undue burden on the devices on that network to process the discovery | |||
| messages. New auto-discovery protcols MUST NOT transmit messages | messages. New auto-discovery protocols MUST NOT transmit messages | |||
| more than once a second. | more than once a second. | |||
| When an auto-discovery mechanism is used for a point-to-point link, | When an auto-discovery mechanism is used for a point-to-point link, | |||
| or with the expectation of establishing a BGP session with a single | or with the expectation of establishing a BGP session with a single | |||
| BGP Speaker on that network, the auto-discovery protocol MAY quiesce | BGP Speaker on that network, the auto-discovery protocol MAY quiesce | |||
| once the discovered BGP session has become Established. | once the discovered BGP session has become Established. | |||
| In cases where the auto-discovery protocol is carried as state in | In cases where the auto-discovery protocol is carried as state in | |||
| another protocol, that protocol will have its own timeliness | another protocol, that protocol will have its own timeliness | |||
| considerations. The auto-discovery mechanism SHOULD NOT interfere | considerations. The auto-discovery mechanism SHOULD NOT interfere | |||
| with the timing of the existing protocol. | with the timing of the existing protocol. | |||
| 3.3. Relationship with BGP | 3.3. Relationship with BGP | |||
| o The auto-discovery mechanism should be independent from BGP | * The auto-discovery mechanism should be independent from BGP | |||
| session establishment. | session establishment. | |||
| o Not affect on BGP session establishment and routing exchange, | * Not affect on BGP session establishment and routing exchange, | |||
| other than the interactions for triggering the setup/removal of | other than the interactions for triggering the setup/removal of | |||
| peer sessions based on the discovery mechanism. | peer sessions based on the discovery mechanism. | |||
| o Potentially leveraging existing BGP protocol sessions for | * Potentially leveraging existing BGP protocol sessions for | |||
| discovery of new BGP sessions. | discovery of new BGP sessions. | |||
| 3.4. Session Selection Considerations | 3.4. Session Selection Considerations | |||
| Candidate BGP sessions to a given BGP Speaker may be discovered by | Candidate BGP sessions to a given BGP Speaker may be discovered by | |||
| one or more auto-discovery protocols. Even for a single protocol, | one or more auto-discovery protocols. Even for a single protocol, | |||
| multiple transport session endpoints may be discovered for the same | multiple transport session endpoints may be discovered for the same | |||
| BGP Speaker. These different sessions may be required for supporting | BGP Speaker. These different sessions may be required for supporting | |||
| different address families, such as IPv4/IPv6, depending on the BGP | different address families, such as IPv4/IPv6, depending on the BGP | |||
| operational practices for that device. Examples include a distinct | operational practices for that device. Examples include a distinct | |||
| skipping to change at page 7, line 37 ¶ | skipping to change at page 7, line 18 ¶ | |||
| can serve to identify the same instance of the BGP Speaker. This is | can serve to identify the same instance of the BGP Speaker. This is | |||
| a required element of the information to be carried in the auto- | a required element of the information to be carried in the auto- | |||
| discovery protocol. | discovery protocol. | |||
| When multiple mechanisms exist to discovery the same BGP speaker in | When multiple mechanisms exist to discovery the same BGP speaker in | |||
| an implementation, that implementation MUST document the process by | an implementation, that implementation MUST document the process by | |||
| which it chooses discovered peers. Those implementations also MUST | which it chooses discovered peers. Those implementations also MUST | |||
| describe interactions with their protocol state machinery for each | describe interactions with their protocol state machinery for each | |||
| mechanism. | mechanism. | |||
| 3.5. Operational Trust Considerations | 3.5. Session Stability Considerations | |||
| BFD [RFC5880] is often used to provide fast failure detection for the | ||||
| BGP protocol. To provide for maximum compatibility and ease of use | ||||
| for auto-discovered sessions, [I-D.ietf-idr-bgp-bfd-strict-mode] | ||||
| SHOULD be used to provide consistent BFD protection for an auto- | ||||
| discovered BGP session. | ||||
| 3.6. Operational Trust Considerations | ||||
| Different deployment models will have different trust models and | Different deployment models will have different trust models and | |||
| requirements. Some of this will be driven by the size, complexity | requirements. Some of this will be driven by the size, complexity | |||
| and operational practices of the operator. For example, some | and operational practices of the operator. For example, some | |||
| operators have very strict physical protection of the datacenter, and | operators have very strict physical protection of the datacenter, and | |||
| their deployment model assumes that anything which plugs into devices | their deployment model assumes that anything which plugs into devices | |||
| in the datacenter is, by definition, trusted. Other operators take a | in the datacenter is, by definition, trusted. Other operators take a | |||
| very different approach, and assume the least possible amount of | very different approach, and assume the least possible amount of | |||
| trust. | trust. | |||
| skipping to change at page 8, line 30 ¶ | skipping to change at page 8, line 36 ¶ | |||
| validation of the datacenter fabric, and ongoing "sanity-checking" to | validation of the datacenter fabric, and ongoing "sanity-checking" to | |||
| confirm that the datacenter is correctly cabled, and that the BGP | confirm that the datacenter is correctly cabled, and that the BGP | |||
| sessions which have been configured from the database match what the | sessions which have been configured from the database match what the | |||
| autodiscovered sessions would have created. Over time, if the BGP | autodiscovered sessions would have created. Over time, if the BGP | |||
| Autoconf solution proves to be successful, reliable, and scaleable, | Autoconf solution proves to be successful, reliable, and scaleable, | |||
| operators may begin using it as the primary source of record. | operators may begin using it as the primary source of record. | |||
| Closely related to these considerations is the "scope" of the | Closely related to these considerations is the "scope" of the | |||
| discovery process. It is expected that many operators will wish to | discovery process. It is expected that many operators will wish to | |||
| only perform discovery on "infrastructure" or "fabric" interfaces, | only perform discovery on "infrastructure" or "fabric" interfaces, | |||
| and not interfaces which face customers. | and not interfaces to customers. | |||
| It is not clear that the solution that chosen will be able to meet | It is not clear that the solution that chosen will be able to meet | |||
| all of the trust and deployment models, and we will need to | all of the trust and deployment models, and we will need to | |||
| prioritize which set(s) of deployment scenarios are the most | prioritize which set(s) of deployment scenarios are the most | |||
| important for the Working Group to solve. | important for the Working Group to solve. | |||
| Trust/Operational deployment driven requirements. The solution | Trust/Operational deployment driven requirements. The solution | |||
| should: | should: | |||
| o Allow operators to determine which classes of interfaces the | * Allow operators to determine which classes of interfaces the | |||
| discovery protocol operates on (e.g: "Interfaces numbered 1-17" or | discovery protocol operates on (e.g: "Interfaces numbered 1-17" or | |||
| "Only 100GE interfaces"). This is likely an implementation | "Only 100GE interfaces"). This is likely an implementation | |||
| detail. | detail. | |||
| o Allow operation in a "validation" or "verification" only mode, | * Allow operation in a "validation" or "verification" only mode, | |||
| where the Autoconf solution populates a database or model showing | where the Autoconf solution populates a database or model showing | |||
| what sessions it would bring up if allowed. | what sessions it would bring up if allowed. | |||
| o Ideally allow for different levels of "granularity" in pre- | ||||
| * Ideally allow for different levels of "granularity" in pre- | ||||
| configuration. For example, if the protocol is capable of | configuration. For example, if the protocol is capable of | |||
| autoconfiguring everything, it should also support filtering or | autoconfiguring everything, it should also support filtering or | |||
| limiting the session according to configured policy. (Likely an | limiting the session according to configured policy. (Likely an | |||
| implementation detail.) | implementation detail.) | |||
| * Support preconfigured authentication systems. This is an area | ||||
| o Support preconfigured authentication systems. This is an area | ||||
| where more discussion is needed! The solution MUST also support a | where more discussion is needed! The solution MUST also support a | |||
| "no authentication" mode. Negotiated keying solutions, such as | "no authentication" mode. Negotiated keying solutions, such as | |||
| IKE, may be desireable but not mandatory for the solution. | IKE, may be desireable but not mandatory for the solution. | |||
| o Support Ethernet sub-interfaces such as VLANs. | * Support Ethernet sub-interfaces such as VLANs. | |||
| o Support non-Ethernet interfaces. This may include tunnels. | * Support non-Ethernet interfaces. This may include tunnels. | |||
| 3.6. Error Handling Considerations | 3.7. Error Handling Considerations | |||
| The purpose of the BGP auto-discovery protocol is to discover | The purpose of the BGP auto-discovery protocol is to discover | |||
| potential BGP sessions and provide enough information for a BGP | potential BGP sessions and provide enough information for a BGP | |||
| Speaker to start a BGP session. It is possible for the information | Speaker to start a BGP session. It is possible for the information | |||
| present in the auto-discovery protocol to not match the session's | present in the auto-discovery protocol to not match the session's | |||
| information. Such mis-matches will result in different classes of | information. Such mis-matches will result in different classes of | |||
| problems: | problems: | |||
| o The BGP transport session may not connect. This could be the | * The BGP transport session may not connect. This could be the | |||
| result of mismatches in IP addresses, GTSM configuration, BGP | result of mismatches in IP addresses, GTSM configuration, BGP | |||
| transport security configuration, etc. In these cases, a BGP | transport security configuration, etc. In these cases, a BGP | |||
| Speaker attempts to establish a session and fails. | Speaker attempts to establish a session and fails. | |||
| Implementations SHOULD provide a way to clear such discovered | Implementations SHOULD provide a way to clear such discovered | |||
| sessions or exclude them from further connect attempts. | sessions or exclude them from further connect attempts. | |||
| o The BGP transport session connects, but the parameters in the BGP | * The BGP transport session connects, but the parameters in the BGP | |||
| OPEN message do not match those in the auto-discovery protocol. | OPEN message do not match those in the auto-discovery protocol. | |||
| In this case, the implementation may wish to disconnect from the | In this case, the implementation may wish to disconnect from the | |||
| BGP session and exclude it from further connection attempts. The | BGP session and exclude it from further connection attempts. The | |||
| implementation SHOULD raise a visible fault to the operator. The | implementation SHOULD raise a visible fault to the operator. The | |||
| implementation SHOULD provide a mechanism to permit further | implementation SHOULD provide a mechanism to permit further | |||
| attempts to connect to the discovered session. | attempts to connect to the discovered session. | |||
| o The operator may choose to leverage the auto-discovery mode for | * The operator may choose to leverage the auto-discovery mode for | |||
| validation purposes only. The implementation should provide | validation purposes only. The implementation should provide | |||
| access to the operator for discovered BGP sessions from the auto- | access to the operator for discovered BGP sessions from the auto- | |||
| discovery protocol; for example via the user-interface. The | discovery protocol; for example via the user-interface. The | |||
| implementation SHOULD permit a manually configured BGP session to | implementation SHOULD permit a manually configured BGP session to | |||
| conflict with information present in the auto-discovery protocol, | conflict with information present in the auto-discovery protocol, | |||
| but SHOULD raise an alarm with the operator that this has been | but SHOULD raise an alarm with the operator that this has been | |||
| done. | done. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| skipping to change at page 12, line 23 ¶ | skipping to change at page 12, line 27 ¶ | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [I-D.acee-idr-lldp-peer-discovery] | [I-D.acee-idr-lldp-peer-discovery] | |||
| Lindem, A., Patel, K., Zandi, S., Haas, J., and X. Xu, | Lindem, A., Patel, K., Zandi, S., Haas, J., and X. Xu, | |||
| "BGP Logical Link Discovery Protocol (LLDP) Peer | "BGP Logical Link Discovery Protocol (LLDP) Peer | |||
| Discovery", draft-acee-idr-lldp-peer-discovery-08 (work in | Discovery", Work in Progress, Internet-Draft, draft-acee- | |||
| progress), December 2020. | idr-lldp-peer-discovery-08, 7 December 2020, | |||
| <https://www.ietf.org/archive/id/draft-acee-idr-lldp-peer- | ||||
| discovery-08.txt>. | ||||
| [I-D.acee-ospf-bgp-rr] | [I-D.acee-ospf-bgp-rr] | |||
| Lindem, A., Patel, K., Zandi, S., and R. Raszuk, "OSPF | Lindem, A., Patel, K., Zandi, S., and R. Raszuk, "OSPF | |||
| Extensions for Advertising/Signaling BGP Route Reflector | Extensions for Advertising/Signaling BGP Route Reflector | |||
| Information", draft-acee-ospf-bgp-rr-01 (work in | Information", Work in Progress, Internet-Draft, draft- | |||
| progress), September 2017. | acee-ospf-bgp-rr-01, 7 September 2017, | |||
| <https://www.ietf.org/archive/id/draft-acee-ospf-bgp-rr- | ||||
| 01.txt>. | ||||
| [I-D.ietf-idr-bgp-bfd-strict-mode] | ||||
| Zheng, M., Lindem, A., Haas, J., and A. Fu, "BGP BFD | ||||
| Strict-Mode", Work in Progress, Internet-Draft, draft- | ||||
| ietf-idr-bgp-bfd-strict-mode-05, 25 April 2021, | ||||
| <https://www.ietf.org/archive/id/draft-ietf-idr-bgp-bfd- | ||||
| strict-mode-05.txt>. | ||||
| [I-D.ietf-lsvr-l3dl] | [I-D.ietf-lsvr-l3dl] | |||
| Bush, R., Austein, R., and K. Patel, "Layer 3 Discovery | Bush, R., Austein, R., and K. Patel, "Layer 3 Discovery | |||
| and Liveness", draft-ietf-lsvr-l3dl-07 (work in progress), | and Liveness", Work in Progress, Internet-Draft, draft- | |||
| January 2021. | ietf-lsvr-l3dl-07, 26 January 2021, | |||
| <https://www.ietf.org/archive/id/draft-ietf-lsvr-l3dl- | ||||
| 07.txt>. | ||||
| [I-D.ietf-lsvr-l3dl-signing] | [I-D.ietf-lsvr-l3dl-signing] | |||
| Bush, R. and R. Austein, "Layer 3 Discovery and Liveness | Bush, R., Housley, R., and R. Austein, "Layer-3 Discovery | |||
| Signing", draft-ietf-lsvr-l3dl-signing-01 (work in | and Liveness Signing", Work in Progress, Internet-Draft, | |||
| progress), January 2021. | draft-ietf-lsvr-l3dl-signing-02, 12 February 2021, | |||
| <https://www.ietf.org/archive/id/draft-ietf-lsvr-l3dl- | ||||
| signing-02.txt>. | ||||
| [I-D.ietf-lsvr-l3dl-ulpc] | [I-D.ietf-lsvr-l3dl-ulpc] | |||
| Bush, R. and K. Patel, "L3DL Upper Layer Protocol | Bush, R. and K. Patel, "L3DL Upper Layer Protocol | |||
| Configuration", draft-ietf-lsvr-l3dl-ulpc-01 (work in | Configuration", Work in Progress, Internet-Draft, draft- | |||
| progress), January 2021. | ietf-lsvr-l3dl-ulpc-01, 26 January 2021, | |||
| <https://www.ietf.org/archive/id/draft-ietf-lsvr-l3dl- | ||||
| ulpc-01.txt>. | ||||
| [I-D.ietf-lsvr-lsoe] | [I-D.ietf-lsvr-lsoe] | |||
| Bush, R., Austein, R., and K. Patel, "Link State Over | Bush, R., Austein, R., and K. Patel, "Link State Over | |||
| Ethernet", draft-ietf-lsvr-lsoe-01 (work in progress), | Ethernet", Work in Progress, Internet-Draft, draft-ietf- | |||
| February 2019. | lsvr-lsoe-01, 17 February 2019, | |||
| <https://www.ietf.org/archive/id/draft-ietf-lsvr-lsoe- | ||||
| 01.txt>. | ||||
| [I-D.raszuk-idr-bgp-auto-discovery] | [I-D.raszuk-idr-bgp-auto-discovery] | |||
| Raszuk, R., Mitchell, J., Kumari, W., Patel, K., and J. | Raszuk, R., Mitchell, J., Kumari, W., Patel, K., and J. | |||
| Scudder, "BGP Auto Discovery", draft-raszuk-idr-bgp-auto- | Scudder, "BGP Auto Discovery", Work in Progress, Internet- | |||
| discovery-06 (work in progress), December 2019. | Draft, draft-raszuk-idr-bgp-auto-discovery-06, 11 December | |||
| 2019, <https://www.ietf.org/archive/id/draft-raszuk-idr- | ||||
| bgp-auto-discovery-06.txt>. | ||||
| [I-D.raszuk-idr-bgp-auto-session-setup] | [I-D.raszuk-idr-bgp-auto-session-setup] | |||
| Raszuk, R., "BGP Automated Session Setup", draft-raszuk- | Raszuk, R., "BGP Automated Session Setup", Work in | |||
| idr-bgp-auto-session-setup-01 (work in progress), December | Progress, Internet-Draft, draft-raszuk-idr-bgp-auto- | |||
| 2019. | session-setup-01, 11 December 2019, | |||
| <https://www.ietf.org/archive/id/draft-raszuk-idr-bgp- | ||||
| auto-session-setup-01.txt>. | ||||
| [I-D.xu-idr-neighbor-autodiscovery] | [I-D.xu-idr-neighbor-autodiscovery] | |||
| Xu, X., Talaulikar, K., Bi, K., Tantsura, J., and N. | Xu, X., Talaulikar, K., Bi, K., Tantsura, J., and N. | |||
| Triantafillis, "BGP Neighbor Discovery", draft-xu-idr- | Triantafillis, "BGP Neighbor Discovery", Work in Progress, | |||
| neighbor-autodiscovery-12 (work in progress), November | Internet-Draft, draft-xu-idr-neighbor-autodiscovery-12, 26 | |||
| 2019. | November 2019, <https://www.ietf.org/archive/id/draft-xu- | |||
| idr-neighbor-autodiscovery-12.txt>. | ||||
| [RFC0826] Plummer, D., "An Ethernet Address Resolution Protocol: Or | [RFC0826] Plummer, D., "An Ethernet Address Resolution Protocol: Or | |||
| Converting Network Protocol Addresses to 48.bit Ethernet | Converting Network Protocol Addresses to 48.bit Ethernet | |||
| Address for Transmission on Ethernet Hardware", STD 37, | Address for Transmission on Ethernet Hardware", STD 37, | |||
| RFC 826, DOI 10.17487/RFC0826, November 1982, | RFC 826, DOI 10.17487/RFC0826, November 1982, | |||
| <https://www.rfc-editor.org/info/rfc826>. | <https://www.rfc-editor.org/info/rfc826>. | |||
| [RFC2385] Heffernan, A., "Protection of BGP Sessions via the TCP MD5 | [RFC2385] Heffernan, A., "Protection of BGP Sessions via the TCP MD5 | |||
| Signature Option", RFC 2385, DOI 10.17487/RFC2385, August | Signature Option", RFC 2385, DOI 10.17487/RFC2385, August | |||
| 1998, <https://www.rfc-editor.org/info/rfc2385>. | 1998, <https://www.rfc-editor.org/info/rfc2385>. | |||
| skipping to change at page 14, line 47 ¶ | skipping to change at page 15, line 24 ¶ | |||
| interface addresses. | interface addresses. | |||
| LLDP has a limitation that all information must fit in a single PDU | LLDP has a limitation that all information must fit in a single PDU | |||
| (it does not support fragmentation / a "session"). There is an early | (it does not support fragmentation / a "session"). There is an early | |||
| LLDPv2 development effort to extend this in the IEEE. | LLDPv2 development effort to extend this in the IEEE. | |||
| [I-D.acee-idr-lldp-peer-discovery] describes how to use the LLDP IETF | [I-D.acee-idr-lldp-peer-discovery] describes how to use the LLDP IETF | |||
| Organizationally Specific TLV to augment the LLDP TLV set to exchange | Organizationally Specific TLV to augment the LLDP TLV set to exchange | |||
| BGP Config Sub-TLVs signaling: | BGP Config Sub-TLVs signaling: | |||
| o AFI | * AFI | |||
| o IP address (IPv4 or IPv6) | * IP address (IPv4 or IPv6) | |||
| o Local AS number | * Local AS number | |||
| o Local BGP Identifier (AKA, BGP Router ID) | * Local BGP Identifier (AKA, BGP Router ID) | |||
| o Session Group-ID; i.e., the BGP Device Role | * Session Group-ID; i.e., the BGP Device Role | |||
| o BGP Session Capabilities | * BGP Session Capabilities | |||
| o Key Chain | * Key Chain | |||
| o Local Address (as BGP Next Hop). | * Local Address (as BGP Next Hop). | |||
| A.1.2. L3DL based Approach | A.1.2. L3DL based Approach | |||
| L3DL [I-D.ietf-lsvr-l3dl] is an ongoing development in the IETF LSVR | L3DL [I-D.ietf-lsvr-l3dl] is an ongoing development in the IETF LSVR | |||
| Working Group with the goal of discovering IP Layer-3 attributes of | Working Group with the goal of discovering IP Layer-3 attributes of | |||
| links, such as neighbor IP addressing, logical link IP encapsulation | links, such as neighbor IP addressing, logical link IP encapsulation | |||
| abilities, and link liveness which may then be disseminated for the | abilities, and link liveness which may then be disseminated for the | |||
| use of BGP-SPF and similar protocols. | use of BGP-SPF and similar protocols. | |||
| L3DL Upper Layer Protocol Configuration, [I-D.ietf-lsvr-l3dl-ulpc], | L3DL Upper Layer Protocol Configuration, [I-D.ietf-lsvr-l3dl-ulpc], | |||
| details signaling the minimal set of parameters needed to start a BGP | details signaling the minimal set of parameters needed to start a BGP | |||
| session with a discovered peer. Details such as loopback peering are | session with a discovered peer. Details such as loopback peering are | |||
| handled by attributes in the L3DL protocol itself. The information | handled by attributes in the L3DL protocol itself. The information | |||
| which can be discovered by L3DL is: | which can be discovered by L3DL is: | |||
| o AS number | * AS number | |||
| o Local IP address, IPv4 or IPv6, and | * Local IP address, IPv4 or IPv6, and | |||
| o BGP Authentication. | * BGP Authentication. | |||
| L3DL and L3DL-ULPC have well-specified security mechanisms, see | L3DL and L3DL-ULPC have well-specified security mechanisms, see | |||
| [I-D.ietf-lsvr-l3dl-signing]. | [I-D.ietf-lsvr-l3dl-signing]. | |||
| The functionality of L3DL-ULPC is similar but not quite the same as | The functionality of L3DL-ULPC is similar but not quite the same as | |||
| the needs of IDR Design Team. For example, L3DL is designed to meet | the needs of IDR Design Team. For example, L3DL is designed to meet | |||
| more complex needs. L3DL's predecessor, LSOE [I-D.ietf-lsvr-lsoe], | more complex needs. L3DL's predecessor, LSOE [I-D.ietf-lsvr-lsoe], | |||
| was simpler and might be a better candidate for adaptation. If | was simpler and might be a better candidate for adaptation. If | |||
| needed, the design of LSOE may be customized for the needs of BGP | needed, the design of LSOE may be customized for the needs of BGP | |||
| peer auto- disovery. | peer auto- disovery. | |||
| skipping to change at page 16, line 41 ¶ | skipping to change at page 17, line 21 ¶ | |||
| A.3.1. New BGP Hello Message based Approach | A.3.1. New BGP Hello Message based Approach | |||
| [I-D.xu-idr-neighbor-autodiscovery] describes a BGP neighbor | [I-D.xu-idr-neighbor-autodiscovery] describes a BGP neighbor | |||
| discovery mechanism which is based on a newly defined UDP based BGP | discovery mechanism which is based on a newly defined UDP based BGP | |||
| Hello message. The BGP Hello message is sent in multicast to | Hello message. The BGP Hello message is sent in multicast to | |||
| discover the directly connected BGP peers. According to the message | discover the directly connected BGP peers. According to the message | |||
| header format and the TLVs carried in the message, the information | header format and the TLVs carried in the message, the information | |||
| which can be signaled is: | which can be signaled is: | |||
| o AS number | * AS number | |||
| o BGP Identifier | * BGP Identifier | |||
| o Accepted ASN list | * Accepted ASN list | |||
| o Peering address (IPv4 or IPv6) | * Peering address (IPv4 or IPv6) | |||
| o Local prefix (for loopback) | * Local prefix (for loopback) | |||
| o Link attributes | * Link attributes | |||
| o Neighbor state | * Neighbor state | |||
| o BGP Authentication | * BGP Authentication | |||
| The mechanisms in this draft do not currently handle fragmentation. | The mechanisms in this draft do not currently handle fragmentation. | |||
| The mechanism in this draft is perhaps unique among the other | The mechanism in this draft is perhaps unique among the other | |||
| proposals in requiring bi-directional state. | proposals in requiring bi-directional state. | |||
| A.3.2. BGP OPEN Message based Approach | A.3.2. BGP OPEN Message based Approach | |||
| [I-D.raszuk-idr-bgp-auto-session-setup] describes a BGP neighbor | [I-D.raszuk-idr-bgp-auto-session-setup] describes a BGP neighbor | |||
| discovery mechanism by reusing BGP OPEN message format with newly | discovery mechanism by reusing BGP OPEN message format with newly | |||
| defined UDP port. The message is called BGP Session Explorer (BSE) | defined UDP port. The message is called BGP Session Explorer (BSE) | |||
| packet and is sent in multicast. Since the message format is the | packet and is sent in multicast. Since the message format is the | |||
| same as BGP OPEN, the information which can be signaled is: | same as BGP OPEN, the information which can be signaled is: | |||
| o AS number | * AS number | |||
| o BGP Identifier | * BGP Identifier | |||
| o Peering address | * Peering address | |||
| The mechanism is currently under-specified with respect to a number | The mechanism is currently under-specified with respect to a number | |||
| of similar properties described elsewhere. A general implication is | of similar properties described elsewhere. A general implication is | |||
| that those properties - and others providing for extensibility of the | that those properties - and others providing for extensibility of the | |||
| auto-discovery mechanism - would need to be added to the BGP OPEN | auto-discovery mechanism - would need to be added to the BGP OPEN | |||
| message and deal with the related impacts on the BGP session's | message and deal with the related impacts on the BGP session's | |||
| finite-state machine. | finite-state machine. | |||
| BGP PDUs, including the OPEN message, may be up to 4k in size. Since | BGP PDUs, including the OPEN message, may be up to 4k in size. Since | |||
| this mechanism leverages Layer 3 multicast, a PDU fragmentation | this mechanism leverages Layer 3 multicast, a PDU fragmentation | |||
| mechanism may need to be described. | mechanism may need to be described. | |||
| A.3.3. Bootstrapping BGP via BGP | A.3.3. Bootstrapping BGP via BGP | |||
| [I-D.raszuk-idr-bgp-auto-discovery] describes a new BGP address | [I-D.raszuk-idr-bgp-auto-discovery] describes a new BGP address | |||
| family. The NLRI carries a Group ID + BGP Identifier as the key. A | family. The NLRI carries a Group ID + BGP Identifier as the key. A | |||
| new BGP Path Attribute carries information about the sessions: | new BGP Path Attribute carries information about the sessions: | |||
| o AS Number | * AS Number | |||
| o AFI/SAFI | * AFI/SAFI | |||
| o BGP Identifier | * BGP Identifier | |||
| o Peer Transport Address | * Peer Transport Address | |||
| o Flags to declare a session for information only, to force a reset | * Flags to declare a session for information only, to force a reset | |||
| of a session on parameter changes, etc. | of a session on parameter changes, etc. | |||
| Since the BGP auto-discovery state is carried by BGP, it inherits the | Since the BGP auto-discovery state is carried by BGP, it inherits the | |||
| security implications of the underlying BGP session. | security implications of the underlying BGP session. | |||
| PDU size considerations are identical to those of a BGP UPDATE | PDU size considerations are identical to those of a BGP UPDATE | |||
| message. | message. | |||
| Similarly, extensibility considerations would rely on either the new | Similarly, extensibility considerations would rely on either the new | |||
| BGP Path Attribute, or one yet to be defined. | BGP Path Attribute, or one yet to be defined. | |||
| A.3.4. Bootstrapping BGP via OSPF | A.3.4. Bootstrapping BGP via OSPF | |||
| [I-D.acee-ospf-bgp-rr] describes a mechanism to learn BGP Route | [I-D.acee-ospf-bgp-rr] describes a mechanism to learn BGP Route | |||
| Reflectors via OSPFv2/OSPFv3 LSAs. Multiple types of scopes are | Reflectors via OSPFv2/OSPFv3 LSAs. Multiple types of scopes are | |||
| defined for these LSAs to help constrain where they are advertised in | defined for these LSAs to help constrain where they are advertised in | |||
| an OSPF domain. | an OSPF domain. | |||
| The BGP Route Reflector TLV contains: | The BGP Route Reflector TLV contains: | |||
| o Local AS Number | * Local AS Number | |||
| o IPv4 or IPv6 Address of the Route Reflector | * IPv4 or IPv6 Address of the Route Reflector | |||
| o A list of AFI/SAFIs supported by the Route Reflector | * A list of AFI/SAFIs supported by the Route Reflector | |||
| The BGP Route Reflector TLV may be advertised more than once, | The BGP Route Reflector TLV may be advertised more than once, | |||
| potentially to describe different IP transport endpoints. | potentially to describe different IP transport endpoints. | |||
| This mechanism does not provide for security properties of the BGP | This mechanism does not provide for security properties of the BGP | |||
| session or transport properties such as BFD or GTSM. | session or transport properties such as BFD or GTSM. | |||
| Authors' Addresses | Authors' Addresses | |||
| Randy Bush | Randy Bush | |||
| Arrcus, Inc. & Internet Initiative Japan | Arrcus, Inc. & Internet Initiative Japan | |||
| 5147 Crystal Springs | 5147 Crystal Springs | |||
| Bainbridge Island, WA 98110 | Bainbridge Island, WA 98110 | |||
| US | United States of America | |||
| Email: randy@psg.com | Email: randy@psg.com | |||
| Jie Dong | Jie Dong | |||
| Huawei Technologies | Huawei Technologies | |||
| Huawei Campus, No. 156 Beiqing Road | Huawei Campus, No. 156 Beiqing Road | |||
| Beijing 100095 | Beijing | |||
| 100095 | ||||
| China | China | |||
| Email: jie.dong@huawei.com | Email: jie.dong@huawei.com | |||
| Jeffrey Haas (editor) | Jeffrey Haas (editor) | |||
| Juniper Networks | Juniper Networks | |||
| 1133 Innovation Way | 1133 Innovation Way | |||
| Sunnyvale, CA 94089 | Sunnyvale, CA 94089 | |||
| US | United States of America | |||
| Email: jhaas@juniper.net | Email: jhaas@juniper.net | |||
| Warren Kumari (editor) | Warren Kumari (editor) | |||
| 1600 Amphitheatre Parkway | 1600 Amphitheatre Parkway | |||
| Mountain View, CA 94043 | Mountain View, CA 94043 | |||
| US | United States of America | |||
| Email: warren@kumari.net | Email: warren@kumari.net | |||
| End of changes. 69 change blocks. | ||||
| 163 lines changed or deleted | 177 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||