< draft-ietf-pce-pcep-18.txt   draft-ietf-pce-pcep-19.txt >
Networking Working Group JP. Vasseur, Ed. Networking Working Group JP. Vasseur, Ed.
Internet-Draft Cisco Systems Internet-Draft Cisco Systems
Intended status: Standards Track JL. Le Roux, Ed. Intended status: Standards Track JL. Le Roux, Ed.
Expires: May 6, 2009 France Telecom Expires: May 21, 2009 France Telecom
November 2, 2008 November 17, 2008
Path Computation Element (PCE) Communication Protocol (PCEP) Path Computation Element (PCE) Communication Protocol (PCEP)
draft-ietf-pce-pcep-18.txt draft-ietf-pce-pcep-19.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 35 skipping to change at page 1, line 35
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 6, 2009. This Internet-Draft will expire on May 21, 2009.
Abstract Abstract
This document specifies the Path Computation Element Communication This document specifies the Path Computation Element Communication
Protocol (PCEP) for communications between a Path Computation Client Protocol (PCEP) for communications between a Path Computation Client
(PCC) and a Path Computation Element (PCE), or between two PCEs. (PCC) and a Path Computation Element (PCE), or between two PCEs.
Such interactions include path computation requests and path Such interactions include path computation requests and path
computation replies as well as notifications of specific states computation replies as well as notifications of specific states
related to the use of a PCE in the context of Multiprotocol Label related to the use of a PCE in the context of Multiprotocol Label
Switching (MPLS) and Generalized (GMPLS) Traffic Engineering. PCEP Switching (MPLS) and Generalized (GMPLS) Traffic Engineering. PCEP
skipping to change at page 3, line 26 skipping to change at page 3, line 26
8.2. Information and Data Models . . . . . . . . . . . . . . . 58 8.2. Information and Data Models . . . . . . . . . . . . . . . 58
8.3. Liveness Detection and Monitoring . . . . . . . . . . . . 58 8.3. Liveness Detection and Monitoring . . . . . . . . . . . . 58
8.4. Verifying Correct Operation . . . . . . . . . . . . . . . 58 8.4. Verifying Correct Operation . . . . . . . . . . . . . . . 58
8.5. Requirements on Other Protocols and Functional 8.5. Requirements on Other Protocols and Functional
Components . . . . . . . . . . . . . . . . . . . . . . . . 59 Components . . . . . . . . . . . . . . . . . . . . . . . . 59
8.6. Impact on Network Operation . . . . . . . . . . . . . . . 59 8.6. Impact on Network Operation . . . . . . . . . . . . . . . 59
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 59 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 59
9.1. TCP Port . . . . . . . . . . . . . . . . . . . . . . . . . 60 9.1. TCP Port . . . . . . . . . . . . . . . . . . . . . . . . . 60
9.2. PCEP Messages . . . . . . . . . . . . . . . . . . . . . . 60 9.2. PCEP Messages . . . . . . . . . . . . . . . . . . . . . . 60
9.3. PCEP Object . . . . . . . . . . . . . . . . . . . . . . . 60 9.3. PCEP Object . . . . . . . . . . . . . . . . . . . . . . . 60
9.4. RP Object . . . . . . . . . . . . . . . . . . . . . . . . 61 9.4. PCEP Message Common Header . . . . . . . . . . . . . . . . 61
9.5. Notification Object . . . . . . . . . . . . . . . . . . . 62 9.5. Open Object Flag Field . . . . . . . . . . . . . . . . . . 62
9.6. PCEP-ERROR Object . . . . . . . . . . . . . . . . . . . . 62 9.6. RP Object . . . . . . . . . . . . . . . . . . . . . . . . 62
9.7. CLOSE Object . . . . . . . . . . . . . . . . . . . . . . . 63 9.7. NO-PATH Object Flag Field . . . . . . . . . . . . . . . . 63
9.8. NO-PATH Object . . . . . . . . . . . . . . . . . . . . . . 64 9.8. METRIC Object . . . . . . . . . . . . . . . . . . . . . . 63
9.9. METRIC Object . . . . . . . . . . . . . . . . . . . . . . 64 9.9. LSPA Object Flag Field . . . . . . . . . . . . . . . . . . 64
9.10. PCEP TLV Type Indicators . . . . . . . . . . . . . . . . . 65 9.10. SVEC Object Flag Field . . . . . . . . . . . . . . . . . . 65
9.11. NO-PATH-VECTOR TLV . . . . . . . . . . . . . . . . . . . . 65 9.11. Notification Object . . . . . . . . . . . . . . . . . . . 65
10. Security Considerations . . . . . . . . . . . . . . . . . . . 65 9.12. PCEP-ERROR Object . . . . . . . . . . . . . . . . . . . . 66
10.1. Vulnerability . . . . . . . . . . . . . . . . . . . . . . 65 9.13. LOAD-BALANCING Object Flag Field . . . . . . . . . . . . . 68
10.2. TCP Security Techniques . . . . . . . . . . . . . . . . . 66 9.14. CLOSE Object . . . . . . . . . . . . . . . . . . . . . . . 68
10.3. PCEP Authentication and Integrity . . . . . . . . . . . . 67 9.15. PCEP TLV Type Indicators . . . . . . . . . . . . . . . . . 69
10.4. PCEP Privacy . . . . . . . . . . . . . . . . . . . . . . . 67 9.16. NO-PATH-VECTOR TLV . . . . . . . . . . . . . . . . . . . . 69
10.5. Key Configuration and Exchange . . . . . . . . . . . . . . 68 10. Security Considerations . . . . . . . . . . . . . . . . . . . 69
10.6. Access Policy . . . . . . . . . . . . . . . . . . . . . . 69 10.1. Vulnerability . . . . . . . . . . . . . . . . . . . . . . 69
10.7. Protection Against Denial of Service Attacks . . . . . . . 70 10.2. TCP Security Techniques . . . . . . . . . . . . . . . . . 70
10.7.1. Protection Against TCP DoS Attacks . . . . . . . . . . 70 10.3. PCEP Authentication and Integrity . . . . . . . . . . . . 71
10.7.2. Request Input Shaping/Policing . . . . . . . . . . . . 71 10.4. PCEP Privacy . . . . . . . . . . . . . . . . . . . . . . . 71
11. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 71 10.5. Key Configuration and Exchange . . . . . . . . . . . . . . 72
12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 72 10.6. Access Policy . . . . . . . . . . . . . . . . . . . . . . 73
13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 73 10.7. Protection Against Denial of Service Attacks . . . . . . . 74
13.1. Normative References . . . . . . . . . . . . . . . . . . . 73 10.7.1. Protection Against TCP DoS Attacks . . . . . . . . . . 74
13.2. Informative References . . . . . . . . . . . . . . . . . . 73 10.7.2. Request Input Shaping/Policing . . . . . . . . . . . . 75
13.3. References . . . . . . . . . . . . . . . . . . . . . . . . 76 11. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 75
Appendix A. PCEP Finite State Machine (FSM) . . . . . . . . . . . 76 12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 76
Appendix B. PCEP Variables . . . . . . . . . . . . . . . . . . . 83 13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 84 13.1. Normative References . . . . . . . . . . . . . . . . . . . 77
Intellectual Property and Copyright Statements . . . . . . . . . . 85 13.2. Informative References . . . . . . . . . . . . . . . . . . 77
13.3. References . . . . . . . . . . . . . . . . . . . . . . . . 80
Appendix A. PCEP Finite State Machine (FSM) . . . . . . . . . . . 80
Appendix B. PCEP Variables . . . . . . . . . . . . . . . . . . . 87
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 88
Intellectual Property and Copyright Statements . . . . . . . . . . 89
1. Introduction 1. Introduction
[RFC4655] describes the motivations and architecture for a Path [RFC4655] describes the motivations and architecture for a Path
Compuation Element (PCE) based model for the computation of Compuation Element (PCE) based model for the computation of
Multiprotocol Label Switching (MPLS) and Generalized (GMPLS) Traffic Multiprotocol Label Switching (MPLS) and Generalized (GMPLS) Traffic
Engineering Label Swtich Paths (TE LSPs). The model allows for the Engineering Label Swtich Paths (TE LSPs). The model allows for the
separation of PCE from Path Computation Client (PCC), and allows for separation of PCE from Path Computation Client (PCC), and allows for
the cooperation between PCEs. This necessitates a communication the cooperation between PCEs. This necessitates a communication
protocol between PCC and PCE, and between PCEs. [RFC4657] states the protocol between PCC and PCE, and between PCEs. [RFC4657] states the
skipping to change at page 29, line 23 skipping to change at page 29, line 23
| | | |
// Optional TLVs // // Optional TLVs //
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 10: RP object body format Figure 10: RP object body format
The RP object body has a variable length and may contain additional The RP object body has a variable length and may contain additional
TLVs. No TLVs are currently defined. TLVs. No TLVs are currently defined.
Flags (24 bits) Flags (32 bits)
The following flags are currently defined: The following flags are currently defined:
o Pri (Priority - 3 bits): the Priority field may be used by the o Pri (Priority - 3 bits): the Priority field may be used by the
requesting PCC to specify to the PCE the request's priority from 1 requesting PCC to specify to the PCE the request's priority from 1
to 7. The decision of which priority should be used for a to 7. The decision of which priority should be used for a
specific request is of a local matter and MUST be set to 0 when specific request is of a local matter and MUST be set to 0 when
unused. Furthermore, the use of the path computation request unused. Furthermore, the use of the path computation request
priority by the PCE's scheduler is implementation specific and out priority by the PCE's scheduler is implementation specific and out
of the scope of this document. Note that it is not required for a of the scope of this document. Note that it is not required for a
skipping to change at page 61, line 45 skipping to change at page 61, line 45
1 1
14 LOAD-BALANCING This document 14 LOAD-BALANCING This document
Object-Type Object-Type
1 1
15 CLOSE This document 15 CLOSE This document
Object-Type Object-Type
1 1
9.4. RP Object 9.4. PCEP Message Common Header
IANA is requested to create a registry to manage the Flag field of
the PCEP Message Common Header.
New bit numbers may be allocated only by an IETF Consensus action. New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities: Each bit should be tracked with the following qualities:
o Bit number o Bit number (counting from bit 0 as the most significant bit)
o Capability Description o Capability Description
o Defining RFC o Defining RFC
Several bits are defined in this document. The following values have No Bits are currently for the PCEP message common header.
been assigned:
9.5. Open Object Flag Field
IANA is requested to create a registry to manage the Flag field of
the Open object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
No Bits are currently for the Open object flag field.
9.6. RP Object
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
Several bits are defined for the RP Object flag field in this
document. The following values have been assigned:
Codespace of the Flag field (RP Object) Codespace of the Flag field (RP Object)
Bit Description Reference Bit Description Reference
0-2 Priority This document 26 Strict/Loose This document
3 Reoptimization This document 27 Bi-directional This document
4 Bi-directional This document 28 Reoptimization This document
5 Strict/Loose This document 29-31 Priority This document
9.5. Notification Object 9.7. NO-PATH Object Flag Field
IANA is requested to create a registry to manage the codespace of NI
field and the Flag field of the NO-PATH object.
Value Meaning Reference
0 No path satisfying the set This document
of constraints could be found
1 PCE chain broken This document
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
One bit is defined for the NO-PATH Object flag field in this
document:
Codespace of the Flag field (NO-PATH Object)
Bit Description Reference
0 Unsatisfied constrained indicated This document
9.8. METRIC Object
IANA is requested to create a registry to manage the codespace of T
field and the Flag field of the METRIC Object.
Codespace of the T field (Metric Object)
Value Meaning Reference
1 IGP metric This document
2 TE metric This document
3 Hop Counts This document
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
Several bits are defined in this document. The following values have
been assigned:
Codespace of the Flag field (Metric Object)
Bit Description Reference
6 Computed metric This document
7 Bound This document
9.9. LSPA Object Flag Field
IANA is requested to create a registry to manage the Flag field of
the LSPA object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
One bit is defined for the LSPA Object flag field in this document:
Codespace of the Flag field (LSPA Object)
Bit Description Reference
7 Local Protection Desired This document
9.10. SVEC Object Flag Field
IANA is requested to create a registry to manage the Flag field of
the SVEC object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
Three bits are defined for the SVEC Object flag field in this
document:
Codespace of the Flag field (SVEC Object)
Bit Description Reference
21 Link Diverse This document
22 Node Diverse This document
23 SRLG Diverse This document
9.11. Notification Object
IANA is requested to create a registry for the Notification-type and IANA is requested to create a registry for the Notification-type and
Notification-value of the Notification Object and manage the code Notification-value of the Notification Object and manage the code
space. space.
Notification-type Name Reference Notification-type Name Reference
1 Pending Request cancelled This document 1 Pending Request cancelled This document
Notification-value Notification-value
1: PCC cancels a set of pending requests 1: PCC cancels a set of pending requests
2: PCE cancels a set of pending requests 2: PCE cancels a set of pending requests
2 PCE Congestion This document 2 PCE Congestion This document
Notification-value Notification-value
1: PCE in congested state 1: PCE in congested state
2: PCE no longer in congested state 2: PCE no longer in congested state
9.6. PCEP-ERROR Object IANA is requested to create a registry to manage the Flag field of
the Notification object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
No Bits are currently for the Flag Field of the Notification Object.
9.12. PCEP-ERROR Object
IANA is requested to create a registry for the Error-type and Error- IANA is requested to create a registry for the Error-type and Error-
value of the PCEP Error Object and manage the code space. value of the PCEP Error Object and manage the code space.
For each PCEP error, an Error-type and an Error-value are defined. For each PCEP error, an Error-type and an Error-value are defined.
Error-Type Meaning Reference Error-Type Meaning Reference
1 PCEP session establishment failure This document 1 PCEP session establishment failure This document
Error-value=1: reception of an invalid Open message or Error-value=1: reception of an invalid Open message or
a non Open message. a non Open message.
Error-value=2: no Open message received before the expiration Error-value=2: no Open message received before the expiration
skipping to change at page 63, line 45 skipping to change at page 67, line 45
Error-value=2: RRO missing for a reoptimization Error-value=2: RRO missing for a reoptimization
request (R bit of the RP object set) request (R bit of the RP object set)
Error-value=3: END-POINTS object missing Error-value=3: END-POINTS object missing
7 Synchronized path computation request missing This document 7 Synchronized path computation request missing This document
8 Unknown request reference This document 8 Unknown request reference This document
9 Attempt to establish a second PCEP session This document 9 Attempt to establish a second PCEP session This document
10 Reception of an invalid object This document 10 Reception of an invalid object This document
Error-value=1: reception of an object with P flag not set although Error-value=1: reception of an object with P flag not set although
the P-flag must be set according to this specification. the P-flag must be set according to this specification.
9.7. CLOSE Object IANA is requested to create a registry to manage the Flag field of
the PCEP-ERROR object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
No Bits are currently for the Flag Field of the PCEP-ERROR Object.
9.13. LOAD-BALANCING Object Flag Field
IANA is requested to create a registry to manage the Flag field of
the LOAD-BALANCING object.
New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities:
o Bit number (counting from bit 0 as the most significant bit)
o Capability Description
o Defining RFC
No Bits are currently for the Flag Field of the LOAD-BALANCING
Object.
9.14. CLOSE Object
The CLOSE object MUST be present in each Close message in order to The CLOSE object MUST be present in each Close message in order to
close a PCEP session. The reason field of the CLOSE object specifies close a PCEP session. The reason field of the CLOSE object specifies
the reason for closing the PCEP session. The reason field of the the reason for closing the PCEP session. The reason field of the
CLOSE object is managed by IANA. CLOSE object is managed by IANA.
Reasons Reasons
Value Meaning Value Meaning
1 No explanation provided 1 No explanation provided
2 DeadTimer expired 2 DeadTimer expired
3 Reception of a malformed PCEP message 3 Reception of a malformed PCEP message
4 Reception of an unacceptable number of 4 Reception of an unacceptable number of
unknown requests/replies unknown requests/replies
5 Reception of an unacceptable number of 5 Reception of an unacceptable number of
unrecognized PCEP messages unrecognized PCEP messages
9.8. NO-PATH Object IANA is requested to create a registry to manage the flag field of
the CLOSE object.
IANA is requested to create a registry to manage the codespace of NI
field present in the NO-PATH Object.
Value Meaning Reference
0 No path satisfying the set This document
of constraints could be found
1 PCE chain broken This document
9.9. METRIC Object
IANA is requested to create a registry to manage the codespace of T
field and the Flag field of the METRIC Object.
Codespace of the T field (Metric Object)
Value Meaning Reference
1 IGP metric This document
2 TE metric This document
3 Hop Counts This document
New bit numbers may be allocated only by an IETF Consensus action. New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities: Each bit should be tracked with the following qualities:
o Bit number o Bit number (counting from bit 0 as the most significant bit)
o Capability Description o Capability Description
o Defining RFC o Defining RFC
Several bits are defined in this document. The following values have No Bits are currently for the Flag Field of the CLOSE Object.
been assigned:
Codespace of the Flag field (Metric Object)
Bit Description Reference
0 Bound This document
1 Computed metric This document
9.10. PCEP TLV Type Indicators 9.15. PCEP TLV Type Indicators
IANA is requested to create a registry for the PCEP TLVs. IANA is requested to create a registry for the PCEP TLVs.
Value Meaning Reference Value Meaning Reference
1 NO-PATH-VECTOR TLV This document 1 NO-PATH-VECTOR TLV This document
2 OVERLOAD-DURATION TLV This document 2 OVERLOAD-DURATION TLV This document
3 REQ-MISSING TLV This document 3 REQ-MISSING TLV This document
9.11. NO-PATH-VECTOR TLV 9.16. NO-PATH-VECTOR TLV
IANA is requested to manage the space of flags carried in the NO- IANA is requested to manage the space of flags carried in the NO-
PATH-VECTOR TLV defined in this document, numbering them from 0 as PATH-VECTOR TLV defined in this document, numbering them from 0 as
the least significant bit. the least significant bit.
New bit numbers may be allocated only by an IETF Consensus action. New bit numbers may be allocated only by an IETF Consensus action.
Each bit should be tracked with the following qualities: - Bit number Each bit should be tracked with the following qualities: - Bit number
- Name flag - Reference (counting from bit 0 as the most significant bit) - Name flag -
Reference
Bit Number Name Reference Bit Number Name Reference
31 PCE currently Unavailable This document 31 PCE currently Unavailable This document
30 Unknown Destination This document 30 Unknown Destination This document
29 Unknown Source This document 29 Unknown Source This document
10. Security Considerations 10. Security Considerations
10.1. Vulnerability 10.1. Vulnerability
skipping to change at page 66, line 46 skipping to change at page 70, line 48
At the time of writing, TCP-MD5 [RFC2385] is the only available At the time of writing, TCP-MD5 [RFC2385] is the only available
security mechanism for securing the TCP connections that underly PCEP security mechanism for securing the TCP connections that underly PCEP
sessions. sessions.
As explained in [RFC2385], the use of MD5 faces some limitations and As explained in [RFC2385], the use of MD5 faces some limitations and
does not provide as high a level of security as was once believed. A does not provide as high a level of security as was once believed. A
PCEP implementation supporting TCP-MD5 SHOULD be designed so that PCEP implementation supporting TCP-MD5 SHOULD be designed so that
stronger security keying techniques or algorithms that may be stronger security keying techniques or algorithms that may be
specified for TCP can be easily integrated in future releases. specified for TCP can be easily integrated in future releases.
The TCP Authentication Option [I-D.ietf-tcpm-tcp-auth-opt] specifies The TCP Authentication Option [I-D.ietf-tcpm-tcp-auth-opt] (TCP-AO)
new security procedures for TCP, but is not yet complete. Since it specifies new security procedures for TCP, but is not yet complete.
is believed that [I-D.ietf-tcpm-tcp-auth-opt] will offer Since it is believed that [I-D.ietf-tcpm-tcp-auth-opt] will offer
significantly improved security for applications using TCP. significantly improved security for applications using TCP.
Implementers should expect to update their implementation as soon as
the TCP Authentication Option is published as an RFC.
Implementations MUST support either TCP-MD5 or TCP Authentication Implementations MUST support TCP-MD5 and should make the security
Option and should make the security function available as a function available as a configuration option.
configuration option.
Operators will need to observe that some deployed PCEP Operators will need to observe that some deployed PCEP
implementations may pre-date the completion of implementations may pre-date the completion of
[I-D.ietf-tcpm-tcp-auth-opt] and it will be necessary to configure [I-D.ietf-tcpm-tcp-auth-opt] and it will be necessary to configure
policy for secure communication between PCEP speakers that support policy for secure communication between PCEP speakers that support
the TCP Authentication Option, and those that don't. the TCP Authentication Option, and those that don't.
An alternative approach for security over TCP transport is to use the An alternative approach for security over TCP transport is to use the
Transport Layer Security (TLS) protocol [RFC5246]. This provides Transport Layer Security (TLS) protocol [RFC5246]. This provides
protection against eavesdropping, tampering, and message forgery. protection against eavesdropping, tampering, and message forgery.
skipping to change at page 73, line 44 skipping to change at page 77, line 47
[I-D.farrel-rtg-common-bnf] [I-D.farrel-rtg-common-bnf]
Farrel, A., "Reduced Backus-Naur Form (RBNF) A Syntax Used Farrel, A., "Reduced Backus-Naur Form (RBNF) A Syntax Used
in Various Protocol Specifications", in Various Protocol Specifications",
draft-farrel-rtg-common-bnf-07 (work in progress), draft-farrel-rtg-common-bnf-07 (work in progress),
November 2008. November 2008.
[I-D.ietf-mpls-mpls-and-gmpls-security-framework] [I-D.ietf-mpls-mpls-and-gmpls-security-framework]
Fang, L. and M. Behringer, "Security Framework for MPLS Fang, L. and M. Behringer, "Security Framework for MPLS
and GMPLS Networks", and GMPLS Networks",
draft-ietf-mpls-mpls-and-gmpls-security-framework-03 (work draft-ietf-mpls-mpls-and-gmpls-security-framework-04 (work
in progress), July 2008. in progress), November 2008.
[I-D.ietf-pce-inter-layer-req] [I-D.ietf-pce-inter-layer-req]
Oki, E., Roux, J., Kumaki, K., Farrel, A., and T. Takeda, Oki, E., Roux, J., Kumaki, K., Farrel, A., and T. Takeda,
"PCC-PCE Communication and PCE Discovery Requirements for "PCC-PCE Communication and PCE Discovery Requirements for
Inter-Layer Traffic Engineering", Inter-Layer Traffic Engineering",
draft-ietf-pce-inter-layer-req-08 (work in progress), draft-ietf-pce-inter-layer-req-08 (work in progress),
October 2008. October 2008.
[I-D.ietf-pce-interas-pcecp-reqs] [I-D.ietf-pce-interas-pcecp-reqs]
Bitar, N., Kumaki, K., and R. Zhang, "Inter-AS Bitar, N., Kumaki, K., and R. Zhang, "Inter-AS
skipping to change at page 74, line 22 skipping to change at page 78, line 24
[I-D.ietf-pce-manageability-requirements] [I-D.ietf-pce-manageability-requirements]
Farrel, A., "Inclusion of Manageability Sections in PCE Farrel, A., "Inclusion of Manageability Sections in PCE
Working Group Drafts", Working Group Drafts",
draft-ietf-pce-manageability-requirements-05 (work in draft-ietf-pce-manageability-requirements-05 (work in
progress), October 2008. progress), October 2008.
[I-D.ietf-pce-monitoring] [I-D.ietf-pce-monitoring]
Vasseur, J., Roux, J., and Y. Ikejiri, "A set of Vasseur, J., Roux, J., and Y. Ikejiri, "A set of
monitoring tools for Path Computation Element based monitoring tools for Path Computation Element based
Architecture", draft-ietf-pce-monitoring-02 (work in Architecture", draft-ietf-pce-monitoring-03 (work in
progress), September 2008. progress), November 2008.
[I-D.ietf-rpsec-bgpsecrec] [I-D.ietf-rpsec-bgpsecrec]
Christian, B. and T. Tauber, "BGP Security Requirements", Christian, B. and T. Tauber, "BGP Security Requirements",
draft-ietf-rpsec-bgpsecrec-09 (work in progress), draft-ietf-rpsec-bgpsecrec-10 (work in progress),
November 2007. November 2008.
[I-D.ietf-tcpm-tcp-auth-opt] [I-D.ietf-tcpm-tcp-auth-opt]
Touch, J., Mankin, A., and R. Bonica, "The TCP Touch, J., Mankin, A., and R. Bonica, "The TCP
Authentication Option", draft-ietf-tcpm-tcp-auth-opt-01 Authentication Option", draft-ietf-tcpm-tcp-auth-opt-02
(work in progress), July 2008. (work in progress), November 2008.
[I-D.kkoushik-pce-pcep-mib] [I-D.kkoushik-pce-pcep-mib]
Stephan, E. and K. Koushik, "PCE communication Stephan, E. and K. Koushik, "PCE communication
protocol(PCEP) Management Information Base", protocol(PCEP) Management Information Base",
draft-kkoushik-pce-pcep-mib-01 (work in progress), draft-kkoushik-pce-pcep-mib-02 (work in progress),
July 2007. November 2008.
[RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
April 1992. April 1992.
[RFC2385] Heffernan, A., "Protection of BGP Sessions via the TCP MD5 [RFC2385] Heffernan, A., "Protection of BGP Sessions via the TCP MD5
Signature Option", RFC 2385, August 1998. Signature Option", RFC 2385, August 1998.
[RFC3471] Berger, L., "Generalized Multi-Protocol Label Switching [RFC3471] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Functional Description", RFC 3471, (GMPLS) Signaling Functional Description", RFC 3471,
January 2003. January 2003.
 End of changes. 26 change blocks. 
95 lines changed or deleted 254 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/