< draft-ietf-pim-sm-bsr-09.txt   draft-ietf-pim-sm-bsr-10.txt >
Internet Engineering Task Force PIM WG Internet Engineering Task Force PIM WG
INTERNET-DRAFT Nidhi Bhaskar/Cisco INTERNET-DRAFT Nidhi Bhaskar/Cisco
draft-ietf-pim-sm-bsr-09.txt Alexander Gall/SWITCH draft-ietf-pim-sm-bsr-10.txt Alexander Gall/SWITCH
James Lingard/Arastra James Lingard/Arastra
Stig Venaas/UNINETT Stig Venaas/UNINETT
23 June 2006 9 February 2007
Expires: December 2006 Expires: August 2007
Bootstrap Router (BSR) Mechanism for PIM Bootstrap Router (BSR) Mechanism for PIM
Status of this Document Status of this Document
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware have applicable patent or other IPR claims of which he or she is aware have
been or will be disclosed, and any of which he or she becomes aware will been or will be disclosed, and any of which he or she becomes aware will
be disclosed, in accordance with Section 6 of BCP 79. be disclosed, in accordance with Section 6 of BCP 79.
skipping to change at page 1, line 39 skipping to change at page 1, line 39
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This document is a product of the IETF PIM WG. Comments should be This document is a product of the IETF PIM WG. Comments should be
addressed to the authors, or the WG's mailing list at pim@ietf.org. addressed to the authors, or the WG's mailing list at pim@ietf.org.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2006). Copyright (C) The IETF Trust (2007).
Abstract Abstract
This document specifies the Bootstrap Router (BSR) mechanism This document specifies the Bootstrap Router (BSR) mechanism
for the class of multicast routing protocols in the PIM for the class of multicast routing protocols in the PIM
(Protocol Independent Multicast) family that use the concept (Protocol Independent Multicast) family that use the concept
of a Rendezvous Point as a means for receivers to discover the of a Rendezvous Point as a means for receivers to discover the
sources that send to a particular multicast group. BSR is one sources that send to a particular multicast group. BSR is one
way that a multicast router can learn the set of group-to-RP way that a multicast router can learn the set of group-to-RP
mappings required in order to function. The mechanism is mappings required in order to function. The mechanism is
dynamic, largely self-configuring, and robust to router dynamic, largely self-configuring, and robust to router
failure. failure.
Table of Contents Table of Contents
1. Introduction. . . . . . . . . . . . . . . . . . . . . . 4 1. Introduction. . . . . . . . . . . . . . . . . . . . . . 5
1.1. Background . . . . . . . . . . . . . . . . . . . . . 4 1.1. Background . . . . . . . . . . . . . . . . . . . . . 5
1.2. Protocol Overview. . . . . . . . . . . . . . . . . . 6 1.2. Protocol Overview. . . . . . . . . . . . . . . . . . 7
1.3. Administrative Scoping and BSR . . . . . . . . . . . 7 1.3. Administrative Scoping and BSR . . . . . . . . . . . 8
2. BSR State and Timers. . . . . . . . . . . . . . . . . . 8 2. BSR State and Timers. . . . . . . . . . . . . . . . . . 9
3. Bootstrap Router Election and RP-Set 3.1. Bootstrap Router Election and RP-Set
Distribution. . . . . . . . . . . . . . . . . . . . . . 9 Distribution . . . . . . . . . . . . . . . . . . . . 11
3.1. Bootstrap Router Election. . . . . . . . . . . . . . 9 3.1. Bootstrap Router Election. . . . . . . . . . . . . . 11
3.1.1. Per-Scope-Zone Candidate-BSR State 3.1.1. Per-Scope-Zone Candidate-BSR State
Machine . . . . . . . . . . . . . . . . . . . . . 10 Machine . . . . . . . . . . . . . . . . . . . . . 11
3.1.2. Per-Scope-Zone State Machine for Non- 3.1.2. Per-Scope-Zone State Machine for Non-
Candidate-BSR Routers . . . . . . . . . . . . . . 12 Candidate-BSR Routers . . . . . . . . . . . . . . 13
3.1.3. Bootstrap Message Processing Checks . . . . . . . 14 3.1.3. Bootstrap Message Processing Checks . . . . . . . 15
3.1.4. State Machine Transition Events . . . . . . . . . 15 3.1.4. State Machine Transition Events . . . . . . . . . 16
3.1.5. State Machine Actions . . . . . . . . . . . . . . 16 3.1.5. State Machine Actions . . . . . . . . . . . . . . 17
3.2. Sending Candidate-RP-Advertisement Messages. . . . . 17 3.2. Sending Candidate-RP-Advertisement Messages. . . . . 18
3.3. Creating the RP-Set at the BSR . . . . . . . . . . . 19 3.3. Creating the RP-Set at the BSR . . . . . . . . . . . 20
3.4. Forwarding Bootstrap Messages. . . . . . . . . . . . 21 3.4. Forwarding Bootstrap Messages. . . . . . . . . . . . 22
3.5. Bootstrap Messages to New and Rebooting 3.5. Bootstrap Messages to New and Rebooting
Routers. . . . . . . . . . . . . . . . . . . . . . . 22 Routers. . . . . . . . . . . . . . . . . . . . . . . 23
3.5.1. No-Forward Bootstrap Messages . . . . . . . . . . 22 3.5.1. No-Forward Bootstrap Messages . . . . . . . . . . 24
3.5.2. Unicasting Bootstrap Messages . . . . . . . . . . 23 3.5.2. Unicasting Bootstrap Messages . . . . . . . . . . 24
3.6. Receiving and Using the RP-Set . . . . . . . . . . . 23 3.6. Receiving and Using the RP-Set . . . . . . . . . . . 24
4. Message Formats . . . . . . . . . . . . . . . . . . . . 23 4. Message Formats . . . . . . . . . . . . . . . . . . . . 24
4.1. Bootstrap Message Format . . . . . . . . . . . . . . 25 4.1. Bootstrap Message Format . . . . . . . . . . . . . . 27
4.1.1. Semantic Fragmentation of BSMs. . . . . . . . . . 29 4.1.1. Semantic Fragmentation of BSMs. . . . . . . . . . 31
4.2. Candidate-RP-Advertisement Message Format. . . . . . 30 4.2. Candidate-RP-Advertisement Message Format. . . . . . 32
5. Timers and Timer Values . . . . . . . . . . . . . . . . 32 5. Timers and Timer Values . . . . . . . . . . . . . . . . 34
6. Security Considerations . . . . . . . . . . . . . . . . 36 6. Security Considerations . . . . . . . . . . . . . . . . 37
6.1. Possible Threats . . . . . . . . . . . . . . . . . . 36 6.1. Possible Threats . . . . . . . . . . . . . . . . . . 37
6.2. Limiting Third-Party DoS Attacks . . . . . . . . . . 37 6.2. Limiting Third-Party DoS Attacks . . . . . . . . . . 38
6.3. Bootstrap Message Security . . . . . . . . . . . . . 37 6.3. Bootstrap Message Security . . . . . . . . . . . . . 38
6.3.1. Rejecting Bootstrap Messages from Invalid 6.3.1. Rejecting Bootstrap Messages from Invalid
Neighbors . . . . . . . . . . . . . . . . . . . . 38 Neighbors . . . . . . . . . . . . . . . . . . . . 39
6.4. Candidate-RP-Advertisement Message Security. . . . . 38 6.4. Candidate-RP-Advertisement Message Security. . . . . 39
6.4.1. Non-Cryptographic Security of C-RP-Adv 6.4.1. Non-Cryptographic Security of C-RP-Adv
Messages. . . . . . . . . . . . . . . . . . . . . 38
6.4.2. Cryptographic Security of C-RP-Adv
Messages. . . . . . . . . . . . . . . . . . . . . 39 Messages. . . . . . . . . . . . . . . . . . . . . 39
6.5. Denial of Service using IPsec. . . . . . . . . . . . 39 6.4.2. Cryptographic Security of C-RP-Adv
7. Contributors. . . . . . . . . . . . . . . . . . . . . . 40 Messages. . . . . . . . . . . . . . . . . . . . . 40
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . 40 6.5. Denial of Service using IPsec. . . . . . . . . . . . 40
9. IANA Considerations . . . . . . . . . . . . . . . . . . 40 7. Contributors. . . . . . . . . . . . . . . . . . . . . . 41
10. Normative References . . . . . . . . . . . . . . . . . 40 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . 41
11. Informative References . . . . . . . . . . . . . . . . 41 9. IANA Considerations . . . . . . . . . . . . . . . . . . 41
10. Normative References . . . . . . . . . . . . . . . . . 41
11. Informative References . . . . . . . . . . . . . . . . 42
1. Introduction 1. Introduction
This document assumes some familiarity with the concepts of Protocol This document assumes some familiarity with the concepts of Protocol
Independent Multicast - Sparse Mode (PIM-SM), as defined in [1], and Bi- Independent Multicast - Sparse Mode (PIM-SM), as defined in [1], and Bi-
directional Protocol Independent Multicast (BIDIR-PIM), as defined in directional Protocol Independent Multicast (BIDIR-PIM), as defined in
[2], as well as with Administratively Scoped IP Multicast, as described [2], as well as with Administratively Scoped IP Multicast, as described
in [3], and the IPv6 Scoped Address Architecture, described in [4]. in [3], and the IPv6 Scoped Address Architecture, described in [4].
For correct operation, every multicast router within a PIM domain must For correct operation, every multicast router within a PIM domain must
skipping to change at page 21, line 10 skipping to change at page 22, line 14
A scoped BSM MUST have at least one group range, and the first group A scoped BSM MUST have at least one group range, and the first group
range in a scoped BSM MUST have the "Admin Scope Zone" bit set. This range in a scoped BSM MUST have the "Admin Scope Zone" bit set. This
group range identifies the scope of the BSM. In a scoped IPv4 BSM, the group range identifies the scope of the BSM. In a scoped IPv4 BSM, the
first group range is the range corresponding to the scope of the BSM. first group range is the range corresponding to the scope of the BSM.
In a scoped IPv6 BSM, the first group range may be any group range In a scoped IPv6 BSM, the first group range may be any group range
subject to the general condition that all the group ranges in such a BSM subject to the general condition that all the group ranges in such a BSM
MUST have a mask length of at least 16 and MUST have the same scope ID MUST have a mask length of at least 16 and MUST have the same scope ID
as the scope of the BSM. as the scope of the BSM.
RP mappings may be included in the first group range of a BSM, just as Apart from identifying the scope, the first group range in a scoped BSM
for any other group range. After this group range, other group ranges is treated like any other range with respect to RP mappings. I.e., all
for which there are RP mappings appear in any order. mappings in the RP-set for this group range, if any, must be included in
this first group range in the BSM. After this group range, other group
ranges in this scope for which there are RP mappings appear in any
order.
The "Admin Scope Zone" bit of all group ranges other than the first The "Admin Scope Zone" bit of all group ranges other than the first
SHOULD be set to 0 on origination, and MUST be ignored on receipt. SHOULD be set to 0 on origination, and MUST be ignored on receipt.
When an elected BSR is being shut down, it should immediately originate When an elected BSR is being shut down, it should immediately originate
a Bootstrap message listing its current RP-Set, but with the BSR a Bootstrap message listing its current RP-Set, but with the BSR
Priority field set to the lowest priority value possible. This will Priority field set to the lowest priority value possible. This will
cause the election of a new BSR to happen more quickly. cause the election of a new BSR to happen more quickly.
3.4. Forwarding Bootstrap Messages 3.4. Forwarding Bootstrap Messages
skipping to change at page 23, line 35 skipping to change at page 24, line 44
routing protocol is also not part of the present specification. routing protocol is also not part of the present specification.
Some group-to-RP mappings in the RP-Set indicate group ranges for which Some group-to-RP mappings in the RP-Set indicate group ranges for which
PIM-SM should be used; others indicate group ranges for use with BIDIR- PIM-SM should be used; others indicate group ranges for use with BIDIR-
PIM. Routers that only support one of these protocols MUST NOT ignore PIM. Routers that only support one of these protocols MUST NOT ignore
ranges indicated as being for the other protocol. They MUST NOT treat ranges indicated as being for the other protocol. They MUST NOT treat
them as being for the protocol they support. them as being for the protocol they support.
4. Message Formats 4. Message Formats
BSR messages are PIM messages, as defined in [1]. The values of the PIM BSR messages are PIM messages, as defined in [1].
Message Type field for BSR messages are: The values of the PIM Message Type field for BSR messages are:
4 Bootstrap 4 Bootstrap
8 Candidate-RP-Advertisement 8 Candidate-RP-Advertisement
As with all other PIM control messages, BSR messages have IP protocol As with all other PIM control messages, BSR messages have IP protocol
number 103. number 103.
Candidate-RP-Advertisement messages are unicast to a BSR. Usually, Candidate-RP-Advertisement messages are unicast to a BSR. Usually,
Bootstrap messages are multicast with TTL 1 to the ALL-PIM-ROUTERS Bootstrap messages are multicast with TTL 1 to the ALL-PIM-ROUTERS
skipping to change at page 40, line 34 skipping to change at page 41, line 34
Rishabh Parekh and Katta Sambasivarao. Rishabh Parekh and Katta Sambasivarao.
9. IANA Considerations 9. IANA Considerations
This document has no actions for IANA. This document has no actions for IANA.
10. Normative References 10. Normative References
[1] W. Fenner, M. Handley, H. Holbrook, I. Kouvelas, "Protocol [1] W. Fenner, M. Handley, H. Holbrook, I. Kouvelas, "Protocol
Independent Multicast - Sparse Mode (PIM-SM): Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol
Specification (Revised)", Internet Draft draft-ietf-pim-sm- Specification (Revised)", RFC 4601, August 2006.
v2-new-11.txt
[2] M. Handley, I. Kouvelas, T. Speakman, L. Vicisano, "Bi-directional [2] M. Handley, I. Kouvelas, T. Speakman, L. Vicisano, "Bi-directional
Protocol Independent Multicast (BIDIR-PIM)", Internet Draft draft- Protocol Independent Multicast (BIDIR-PIM)", Internet Draft draft-
ietf-pim-bidir-08.txt ietf-pim-bidir-08.txt
[3] D. Meyer, "Administratively Scoped IP Multicast", RFC 2365, Jul [3] D. Meyer, "Administratively Scoped IP Multicast", RFC 2365, Jul
1998. 1998.
[4] S. Deering, B. Haberman, T. Jinmei, E. Nordmark, B. Zill, "IPv6 [4] S. Deering, B. Haberman, T. Jinmei, E. Nordmark, B. Zill, "IPv6
Scoped Address Architecture", RFC 4007, Mar 2005. Scoped Address Architecture", RFC 4007, Mar 2005.
skipping to change at page 42, line 12 skipping to change at page 43, line 12
USA USA
jchl@arastra.com jchl@arastra.com
Stig Venaas Stig Venaas
UNINETT UNINETT
NO-7465 Trondheim NO-7465 Trondheim
Norway Norway
venaas@uninett.no venaas@uninett.no
Copyright Statement Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject to Copyright (C) The IETF Trust (2007).
the rights, licenses and restrictions contained in BCP 78, and except as
set forth therein, the authors retain all their rights. This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors retain
all their rights.
This document and the information contained herein are provided on an This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR
IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property Intellectual Property
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in this pertain to the implementation or use of the technology described in this
document or the extent to which any license under such rights might or document or the extent to which any license under such rights might or
might not be available; nor does it represent that it has made any might not be available; nor does it represent that it has made any
 End of changes. 15 change blocks. 
56 lines changed or deleted 60 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/