< draft-ietf-ospf-stdreport-02.txt   draft-ietf-ospf-stdreport-03.txt >
Network Working Group J. Moy Network Working Group J. Moy
Internet Draft Cascade Communications Corp. Internet Draft Ascend Communications, Inc.
Expiration Date: November 1997 May 1997 Expiration Date: August 1998 February 1998
File name: draft-ietf-ospf-stdreport-02.txt File name: draft-ietf-ospf-stdreport-03.txt
OSPF Standardization Report OSPF Standardization Report
Status of this Memo Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts. working documents as Internet-Drafts.
skipping to change at page 1, line 40 skipping to change at page 1, line 40
This memo documents how the requirements for advancing a routing This memo documents how the requirements for advancing a routing
protocol to Full Standard, set out in [Ref2], have been met for protocol to Full Standard, set out in [Ref2], have been met for
OSPFv2. OSPFv2.
Please send comments to ospf@gated.cornell.edu. Please send comments to ospf@gated.cornell.edu.
Table of Contents Table of Contents
1 Introduction ........................................... 2 1 Introduction ........................................... 2
2 Modifications since Draft Standard status .............. 2 2 Modifications since Draft Standard status .............. 2
2.1 Point-to-MultiPoint interface .......................... 3 2.1 Point-to-MultiPoint interface .......................... 4
2.2 Cryptographic Authentication ........................... 4 2.2 Cryptographic Authentication ........................... 4
3 Updated implementation and deployment experience ....... 4 3 Updated implementation and deployment experience ....... 4
4 Protocol Security ...................................... 6 4 Protocol Security ...................................... 6
References ............................................. 7 References ............................................. 7
Security Considerations ................................ 8 Security Considerations ................................ 8
Author's Address ....................................... 8 Author's Address ....................................... 8
1. Introduction 1. Introduction
OSPFv2, herein abbreviated simply as OSPF, is an IPv4 routing OSPFv2, herein abbreviated simply as OSPF, is an IPv4 routing
protocol documented in [Ref1]. OSPF is a link-state routing protocol documented in [Ref8]. OSPF is a link-state routing
protocol. It is designed to be run internal to a single Autonomous protocol. It is designed to be run internal to a single Autonomous
System. Each OSPF router maintains an identical database describing System. Each OSPF router maintains an identical database describing
the Autonomous System's topology. From this database, a routing the Autonomous System's topology. From this database, a routing
table is calculated by constructing a shortest-path tree. OSPF table is calculated by constructing a shortest-path tree. OSPF
features include the following: features include the following:
o OSPF responds quickly to topology changes, expending a minimum o OSPF responds quickly to topology changes, expending a minimum
of network bandwidth in the process. of network bandwidth in the process.
o Support for CIDR addressing. o Support for CIDR addressing.
skipping to change at page 2, line 30 skipping to change at page 2, line 30
security. security.
o Equal-cost multipath. o Equal-cost multipath.
o An area routing capability is provided, enabling an Autonomous o An area routing capability is provided, enabling an Autonomous
system to be split into a two level hierarchy to further reduce system to be split into a two level hierarchy to further reduce
the amount of routing protocol traffic. the amount of routing protocol traffic.
o OSPF allows import of external routing information into the o OSPF allows import of external routing information into the
Autonomous System, including a tagging feature that can be Autonomous System, including a tagging feature that can be
exploited to exchange extra information at the AS boundaries exploited to exchange extra information at the AS boundary (see
(see [Ref7]). [Ref7]).
An analysis of OSPF together with a more detailed description of An analysis of OSPF together with a more detailed description of
OSPF features was originally provided in [Ref6], as a part of OSPF features was originally provided in [Ref6], as a part of
promoting OSPF to Draft Standard status. The analysis of OSPF promoting OSPF to Draft Standard status. The analysis of OSPF
remains unchanged. Two additional major features have been developed remains unchanged. Two additional major features have been developed
for OSPF since the protocol achieved Draft Standard status: the for OSPF since the protocol achieved Draft Standard status: the
Point-to-MultiPoint interface and Cryptographic Authentication. Point-to-MultiPoint interface and Cryptographic Authentication.
These features are described in Sections 2.1 and 2.2 respectively of These features are described in Sections 2.1 and 2.2 respectively of
this memo. this memo.
The OSPF MIB is documented in [Ref4]. It is currently at Draft The OSPF MIB is documented in [Ref4]. It is currently at Draft
Standard status. Standard status.
2. Modifications since Draft Standard status 2. Modifications since Draft Standard status
OSPF was last released as RFC 1583 [Ref3], which is labeled with OSPF became a Draft Standard with the release of RFC 1583 [Ref3].
Draft Standard status. Implementations of the new specification in Implementations of the new specification in [Ref8] are backward-
[Ref1] are backward-compatible with RFC 1583. The differences compatible with RFC 1583. The differences between the two documents
between the two documents are described in Appendix G of [Ref1]. are described in the Appendix Gs of [Ref1] and [Ref8]. These
These differences are listed briefly below. Two major features were differences are listed briefly below. Two major features were also
also added, the Point-to-MultiPoint interface and Cryptographic added, the Point-to-MultiPoint interface and Cryptographic
Authentication, which are described in separate sections. Authentication, which are described in separate sections.
o Configuration requirements for OSPF area address ranges have o Configuration requirements for OSPF area address ranges have
been relaxed to allow greater flexibility in area assignment. been relaxed to allow greater flexibility in area assignment.
See Section G.3 of [Ref1] for details. See Section G.3 of [Ref1] for details.
o The OSPF flooding algorithm was modified to a) improve database o The OSPF flooding algorithm was modified to a) improve database
convergence in networks with low speed links and b) resolve a convergence in networks with low speed links b) resolve a
problem where unnecessary LSA retransmissions could occur as a problem where unnecessary LSA retransmissions could occur as a
result of differing clock granularities. See Sections G.4 and result of differing clock granularities, c) remove race
G.5 of [Ref1] for details. conditions between the flooding of MaxAge LSAs and the Database
Exchange process, d) clarify the use of the MinLSArrival
constant, and e) rate-limit the response to less recent LSAs
received via flooding. See Sections G.4 and G.5 of [Ref1] and
Section G.1 of [Ref8] for details.
o To resolve the long-standing confusion regarding representation o To resolve the long-standing confusion regarding representation
of point-to-point links in OSPF, the specification now of point-to-point links in OSPF, the specification now
optionally allows advertisement of a stub link to a point-to- optionally allows advertisement of a stub link to a point-to-
point link's subnet, ala RIP. See Section G.6 of [Ref1]. point link's subnet, ala RIP. See Section G.6 of [Ref1].
o Several problems involving advertising the same external route o Several problems involving advertising the same external route
from multiple areas were found and fixed, as described in from multiple areas were found and fixed, as described in
Section G.7 of [Ref1]. Without the fixes, persistent routing Section G.7 of [Ref1] and Section G.2 of [Ref8]. Without the
loops could form in certain such configurations. Note that one fixes, persistent routing loops could form in certain such
of the fixes was not backward-compatible, in that mixing routers configurations. Note that one of the fixes was not backward-
implementing the fixes with those implementing just RFC 1583 compatible, in that mixing routers implementing the fixes with
could cause loops not present in an RFC 1583-only configuration. those implementing just RFC 1583 could cause loops not present
This caused an RFC1583Compatibility global configuration in an RFC 1583-only configuration. This caused an
parameter to be added, as described in Section C.1 of [Ref1]. RFC1583Compatibility global configuration parameter to be added,
as described in Section C.1 of [Ref1].
o In order to deal with high delay links, retransmissions of o In order to deal with high delay links, retransmissions of
initial Database Description packets no longer reset an OSPF initial Database Description packets no longer reset an OSPF
adjacency. adjacency.
o In order to detect link MTU mismatches, which can cause problems o In order to detect link MTU mismatches, which can cause problems
both in IP forwarding and in the OSPF routing protocol itself, both in IP forwarding and in the OSPF routing protocol itself,
MTU was added to OSPF's Database Description packets. MTU was added to OSPF's Database Description packets.
Neighboring routers refuse to bring up an OSPF adjacency unless Neighboring routers refuse to bring up an OSPF adjacency unless
they agree on their common link's MTU. they agree on their common link's MTU.
o The TOS routing option was deleted from OSPF. However, for o The TOS routing option was deleted from OSPF. However, for
backward compatibility the formats of OSPF's various LSAs remain backward compatibility the formats of OSPF's various LSAs remain
unchanged, maintaining the ability to specify TOS metrics in unchanged, maintaining the ability to specify TOS metrics in
router-LSAs, summary-LSAs, ASBR-summary-LSAs, and AS-external- router-LSAs, summary-LSAs, ASBR-summary-LSAs, and AS-external-
LSAs. LSAs.
o OSPF's routing table lookup algorithm was changed to reflect
current practice. The "best match" routing table entry is now
always selected to be the one providing the most specific
(longest) match. See Section G.4 of [Ref8] for details.
2.1. Point-to-MultiPoint interface 2.1. Point-to-MultiPoint interface
The Point-to-MultiPoint interface was added as an alternative to The Point-to-MultiPoint interface was added as an alternative to
OSPF's NBMA interface when running OSPF over non-broadcast OSPF's NBMA interface when running OSPF over non-broadcast
subnets. Unlike the NBMA interface, Point-to-MultiPoint does not subnets. Unlike the NBMA interface, Point-to-MultiPoint does not
require full mesh connectivity over the non-broadcast subnet. require full mesh connectivity over the non-broadcast subnet.
Point-to-MultiPoint is less efficient than NBMA, but is easier Point-to-MultiPoint is less efficient than NBMA, but is easier
to configure (in fact, it can be self-configuring) and is more to configure (in fact, it can be self-configuring) and is more
robust than NBMA, tolerating all failures within the non- robust than NBMA, tolerating all failures within the non-
broadcast subnet. For more information on the Point-to- broadcast subnet. For more information on the Point-to-
skipping to change at page 6, line 14 skipping to change at page 6, line 14
Parameter Responses Min Mode Mean Max Parameter Responses Min Mode Mean Max
_________________________________________________________________ _________________________________________________________________
Max routers in domain 8 20 350 510 1000 Max routers in domain 8 20 350 510 1000
Max routers in single area 8 20 100 160 350 Max routers in single area 8 20 100 160 350
Max areas in domain 7 1 15 23 60 Max areas in domain 7 1 15 23 60
Max AS-external-LSAs 6 50 1K 2K 5K Max AS-external-LSAs 6 50 1K 2K 5K
Table 3: OSPF domain sizes deployed Table 3: OSPF domain sizes deployed
In an attempt to ascertain the extent to which OSPF is currently
deployed, vendors were also asked in January 1998 to provide
deployment estimates. Four vendors of OSPF routers responded, with a
total estimate of 182,000 OSPF routers in service, organized into
4300 separate OSPF routing domains.
4. Protocol Security 4. Protocol Security
All OSPF protocol exchanges are authenticated. OSPF supports All OSPF protocol exchanges are authenticated. OSPF supports
multiple types of authentication; the type of authentication in use multiple types of authentication; the type of authentication in use
can be configured on a per network segment basis. One of OSPF's can be configured on a per network segment basis. One of OSPF's
authentication types, namely the Cryptographic authentication authentication types, namely the Cryptographic authentication
option, is believed to be secure against passive attacks and provide option, is believed to be secure against passive attacks and provide
significant protection against active attacks. When using the significant protection against active attacks. When using the
Cryptographic authentication option, each router appends a "message Cryptographic authentication option, each router appends a "message
digest" to its transmitted OSPF packets. Receivers then use the digest" to its transmitted OSPF packets. Receivers then use the
skipping to change at page 7, line 7 skipping to change at page 7, line 7
None of the OSPF authentication types provide confidentiality. Nor None of the OSPF authentication types provide confidentiality. Nor
do they protect against traffic analysis. Key management is also not do they protect against traffic analysis. Key management is also not
addressed by the OSPF specification. addressed by the OSPF specification.
For more information, see Sections 8.1, 8.2, and Appendix D of For more information, see Sections 8.1, 8.2, and Appendix D of
[Ref1]. [Ref1].
References References
[Ref1] Moy, J., "OSPF Version 2", Internet Draft, <draft-ietf- [Ref1] Moy, J., "OSPF Version 2", RFC 2178, July 1997.
ospf-version2-11.txt>, Cascade, April 1997.
[Ref2] Hinden, B., "Internet Routing Protocol Standardization [Ref2] Hinden, B., "Internet Routing Protocol Standardization
Criteria", RFC 1264, October 1991. Criteria", RFC 1264, October 1991.
[Ref3] Moy, J., "OSPF Version 2", RFC 1583, March 1994. [Ref3] Moy, J., "OSPF Version 2", RFC 1583, March 1994.
[Ref4] Baker, F,, and R. Coltun, "OSPF Version 2 Management [Ref4] Baker, F,, and R. Coltun, "OSPF Version 2 Management
Information Base", RFC 1850, November 1995. Information Base", RFC 1850, November 1995.
[Ref5] Moy, J., "OSPF Protocol Analysis", RFC 1245, August 1991. [Ref5] Moy, J., "OSPF Protocol Analysis", RFC 1245, August 1991.
[Ref6] Moy, J., "Experience with the OSPF Protocol", RFC 1246, [Ref6] Moy, J., "Experience with the OSPF Protocol", RFC 1246,
August 1991. August 1991.
[Ref7] Varadhan, K., S. Hares and Y. Rekhter, "BGP4/IDRP for IP--- [Ref7] Varadhan, K., S. Hares and Y. Rekhter, "BGP4/IDRP for IP---
OSPF Interaction", RFC 1745, December 1994. OSPF Interaction", RFC 1745, December 1994.
[Ref8] Moy, J., "OSPF Version 2", Internet Draft, <draft-ietf-
ospf-vers2-02.txt>, January 1998.
Security Considerations Security Considerations
Security considerations are addressed in Section 4 of this memo. Security considerations are addressed in Section 4 of this memo.
Author's Address Author's Address
John Moy John Moy
Cascade Communications Corp. Ascend Communications, Inc.
5 Carlisle Road 1 Robbins Road
Westford, MA 01886 Westford, MA 01886
Phone: 508-952-1367 Phone: 978-952-1367
Fax: 508-692-9214 Fax: 978-392-2075
Email: jmoy@casc.com Email: jmoy@casc.com
This document expires in November 1997. This document expires in August 1998.
 End of changes. 15 change blocks. 
29 lines changed or deleted 47 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/