idnits 2.17.1 draft-ietf-mpls-bfd-directed-14.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- No issues found here. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year -- The document date (June 22, 2020) is 1402 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) No issues found here. Summary: 0 errors (**), 0 flaws (~~), 1 warning (==), 1 comment (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 MPLS Working Group G. Mirsky 3 Internet-Draft ZTE 4 Intended status: Standards Track J. Tantsura 5 Expires: December 24, 2020 Nuage Networks 6 I. Varlashkin 7 Google 8 M. Chen 9 Huawei 10 June 22, 2020 12 Bidirectional Forwarding Detection (BFD) Directed Return Path 13 draft-ietf-mpls-bfd-directed-14 15 Abstract 17 Bidirectional Forwarding Detection (BFD) is expected to be able to 18 monitor a wide variety of encapsulations of paths between systems. 19 When a BFD session monitors an explicitly routed unidirectional path 20 there may be a need to direct egress BFD peer to use a specific path 21 for the reverse direction of the BFD session. 23 Status of This Memo 25 This Internet-Draft is submitted in full conformance with the 26 provisions of BCP 78 and BCP 79. 28 Internet-Drafts are working documents of the Internet Engineering 29 Task Force (IETF). Note that other groups may also distribute 30 working documents as Internet-Drafts. The list of current Internet- 31 Drafts is at https://datatracker.ietf.org/drafts/current/. 33 Internet-Drafts are draft documents valid for a maximum of six months 34 and may be updated, replaced, or obsoleted by other documents at any 35 time. It is inappropriate to use Internet-Drafts as reference 36 material or to cite them other than as "work in progress." 38 This Internet-Draft will expire on December 24, 2020. 40 Copyright Notice 42 Copyright (c) 2020 IETF Trust and the persons identified as the 43 document authors. All rights reserved. 45 This document is subject to BCP 78 and the IETF Trust's Legal 46 Provisions Relating to IETF Documents 47 (https://trustee.ietf.org/license-info) in effect on the date of 48 publication of this document. Please review these documents 49 carefully, as they describe your rights and restrictions with respect 50 to this document. Code Components extracted from this document must 51 include Simplified BSD License text as described in Section 4.e of 52 the Trust Legal Provisions and are provided without warranty as 53 described in the Simplified BSD License. 55 Table of Contents 57 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 58 1.1. Conventions used in this document . . . . . . . . . . . . 3 59 1.1.1. Requirements Language . . . . . . . . . . . . . . . . 3 60 2. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 3 61 3. Control of the Reverse BFD Path . . . . . . . . . . . . . . . 3 62 3.1. BFD Reverse Path TLV . . . . . . . . . . . . . . . . . . 3 63 3.2. Return Codes . . . . . . . . . . . . . . . . . . . . . . 5 64 4. Use Case Scenario . . . . . . . . . . . . . . . . . . . . . . 5 65 5. Operational Considerations . . . . . . . . . . . . . . . . . 5 66 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 67 6.1. BFD Reverse Path TLV . . . . . . . . . . . . . . . . . . 6 68 6.2. Return Code . . . . . . . . . . . . . . . . . . . . . . . 6 69 7. Implementation Status . . . . . . . . . . . . . . . . . . . . 7 70 8. Security Considerations . . . . . . . . . . . . . . . . . . . 8 71 9. Normative References . . . . . . . . . . . . . . . . . . . . 8 72 Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . 9 73 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 75 1. Introduction 77 [RFC5880], [RFC5881], and [RFC5883] established the BFD protocol for 78 IP networks. [RFC5884] and [RFC7726] set rules for using BFD 79 asynchronous mode over IP/MPLS LSPs. These standards do not define 80 means to control the path selection at the egress BFD peer to send 81 BFD control packets towards the ingress BFD system. 83 For the case when BFD is used to detect defects of the traffic 84 engineered LSP the path the BFD control packets transmitted by the 85 egress BFD system toward the ingress may be disjoint from the LSP in 86 the forward direction. The fact that BFD control packets are not 87 guaranteed to follow the same links and nodes in both forward and 88 reverse directions may be one of the factors contributing to 89 producing false positive defect notifications, i.e., false alarms, at 90 the ingress BFD peer. Ensuring that both directions of the BFD 91 session use co-routed paths may, in some environments, improve the 92 determinism of the failure detection and localization. 94 This document defines the BFD Reverse Path TLV as an extension to LSP 95 Ping [RFC8029] and proposes that it is to be used to instruct the 96 egress BFD peer to use an explicit path for its BFD control packets 97 associated with a particular BFD session. The TLV will be allocated 98 from the TLV and sub-TLV registry defined in [RFC8029]. As a special 99 case, forward and reverse directions of the BFD session can form a 100 bi-directional co-routed associated channel. 102 1.1. Conventions used in this document 104 1.1.1. Requirements Language 106 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 107 "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 108 "OPTIONAL" in this document are to be interpreted as described in BCP 109 14 [RFC2119] [RFC8174] when, and only when, they appear in all 110 capitals, as shown here. 112 2. Problem Statement 114 When BFD is used to monitor explicitly routed unidirectional path, 115 e.g., MPLS-TE LSP, BFD control packets in forward direction would be 116 in-band using the mechanism defined in [RFC5884]. But the reverse 117 direction of the BFD session would follow the shortest path route and 118 that might lead to the problem in detecting failures on an explicit 119 unidirectional path as described below: 121 o detection by an ingress node of a failure on the reverse path may 122 not be unambiguously interpreted as the failure of the path in the 123 forward direction. 125 To address this scenario, the egress BFD peer would be instructed to 126 use a specific path for BFD control packets. 128 3. Control of the Reverse BFD Path 130 To bootstrap a BFD session over an MPLS LSP, LSP ping, defined in 131 [RFC8029], MUST be used with BFD Discriminator TLV [RFC5884]. This 132 document defines a new TLV, BFD Reverse Path TLV, that MUST contain a 133 single sub-TLV that can be used to carry information about the 134 reverse path for the BFD session that is specified by the value in 135 BFD Discriminator TLV. 137 3.1. BFD Reverse Path TLV 139 The BFD Reverse Path TLV is an optional TLV within the LSP ping 140 [RFC8029]. However, if used, the BFD Discriminator TLV MUST be 141 included in an Echo Request message as well. If the BFD 142 Discriminator TLV is not present when the BFD Reverse Path TLV is 143 included; then it MUST be treated as malformed Echo Request, as 144 described in [RFC8029]. 146 The BFD Reverse Path TLV carries information about the path onto 147 which the egress BFD peer of the BFD session referenced by the BFD 148 Discriminator TLV MUST transmit BFD control packets. The format of 149 the BFD Reverse Path TLV is as presented in Figure 1. 151 0 1 2 3 152 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 153 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 154 | BFD Reverse Path TLV Type | Length | 155 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 156 | Reverse Path | 157 ~ ~ 158 | | 159 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 161 Figure 1: BFD Reverse Path TLV 163 BFD Reverse Path TLV Type is two octets in length and has a value of 164 TBD1 (to be assigned by IANA as requested in Section 6). 166 Length field is two octets long and defines the length in octets of 167 the Reverse Path field. 169 Reverse Path field contains a sub-TLV. Any non-multicast Target FEC 170 Stack sub-TLV (already defined, or to be defined in the future) for 171 TLV Types 1, 16, and 21 of MPLS LSP Ping Parameters registry MAY be 172 used in this field. Multicast Target FEC Stack sub-TLVs, i.e., p2mp 173 and mp2mp, SHOULD NOT be included in Reverse Path field. If the 174 egress LSR finds multicast Target Stack sub-TLV, it MUST send echo 175 reply with the received Reverse Path TLV, BFD Discriminator TLV and 176 set the Return Code to "Inappropriate Target FEC Stack sub-TLV 177 present" Section 3.2. None, one or more sub-TLVs MAY be included in 178 the BFD Reverse Path TLV. If no sub-TLVs are found in the BFD 179 Reverse Path TLV, the egress BFD peer MUST revert to using the local 180 policy based decision as described in Section 7 [RFC5884], i.e., 181 routed over IP network. 183 If the egress LSR cannot find the path specified in the Reverse Path 184 TLV it MUST send Echo Reply with the received BFD Discriminator TLV, 185 Reverse Path TLV and set the Return Code to "Failed to establish the 186 BFD session. The specified reverse path was not found" Section 3.2. 187 An implementation MAY provide configuration options to define action 188 at the egress BFD peer. For example, if the egress LSR cannot find 189 the path specified in the Reverse Path TLV it MAY establish the BFD 190 session over IP network as defined in [RFC5884]. 192 3.2. Return Codes 194 This document defines the following Return Codes for MPLS LSP Echo 195 Reply: 197 o "Inappropriate Target FEC Stack sub-TLV present", (TBD3). When 198 multicast Target FEC Stack sub-TLV found in the received Echo 199 Request by the egress BFD peer, an Echo Reply with the return code 200 set to "Inappropriate Target FEC Stack sub-TLV present" MUST be 201 sent to the ingress BFD peer Section 3.1. 203 o "Failed to establish the BFD session. The specified reverse path 204 was not found", (TBD4). When a specified reverse path is not 205 available at the egress BFD peer, an Echo Reply with the return 206 code set to "Failed to establish the BFD session. The specified 207 reverse path was not found" MUST be sent back to the ingress BFD 208 peer Section 3.1. 210 4. Use Case Scenario 212 In the network presented in Figure 2 node A monitors two tunnels to 213 node H: A-B-C-D-G-H and A-B-E-F-G-H. To bootstrap a BFD session to 214 monitor the first tunnel, node A MUST include a BFD Discriminator TLV 215 with Discriminator value (e.g., foobar-1) and MAY include a BFD 216 Reverse Path TLV that references H-G-D-C-B-A tunnel. To bootstrap a 217 BFD session to monitor the second tunnel, node A MUST include a BFD 218 Discriminator TLV with a different Discriminator value (e.g., foobar- 219 2) [RFC7726] and MAY include a BFD Reverse Path TLV that references 220 H-G-F-E-B-A tunnel. 222 C---------D 223 | | 224 A-------B G-----H 225 | | 226 E---------F 228 Figure 2: Use Case for BFD Reverse Path TLV 230 If an operator needs node H to monitor a path to node A, e.g. 231 H-G-D-C-B-A tunnel, then by looking up the list of known Reverse 232 Paths it MAY find and use the existing BFD session. 234 5. Operational Considerations 236 When an explicit path is set either as Static or RSVP-TE LSP, 237 corresponding sub-TLVs, defined in [RFC7110], MAY be used to identify 238 the explicit reverse path for the BFD session. If any of defined in 239 [RFC7110] sub-TLVs used in BFD Reverse Path TLV, then the periodic 240 verification of the control plane against the data plane, as 241 recommended in Section 4 [RFC5884], MUST use the Return Path TLV, as 242 per [RFC7110], with that sub-TLV. By using the LSP Ping with Return 243 Path TLV, an operator monitors whether at the egress BFD node the 244 reverse LSP is mapped to the same FEC as the BFD session. Selection 245 and control of the rate of LSP Ping with Return Path TLV follows the 246 recommendation of [RFC5884]: "The rate of generation of these LSP 247 Ping Echo request messages SHOULD be significantly less than the rate 248 of generation of the BFD Control packets. An implementation MAY 249 provide configuration options to control the rate of generation of 250 the periodic LSP Ping Echo request messages." 252 If an operator planned network maintenance activity that possibly 253 affects FEC used in the BFD Reverse Path TLV, the operator MUST avoid 254 the unnecessary disruption using the LSP Ping with a new FEC in the 255 BFD Reverse Path TLV. But in some scenarios, proactive measures 256 cannot be taken. Because the frequency of LSP Ping messages will be 257 lower than the defect detection time provided by the BFD session. As 258 a result, a change in the reverse-path FEC will first be detected as 259 the failure of the BFD session. In such a case, the ingress BFD node 260 SHOULD immediately transmit the LSP Ping Echo request with Return 261 Path TLV to verify whether the FEC is still valid. If the failure 262 was caused by the change in the FEC used for the reverse direction of 263 the BFD session, the ingress BFD node SHOULD bootstrap a new BFD 264 session using another FEC in BFD Reverse Path TLV. 266 6. IANA Considerations 268 6.1. BFD Reverse Path TLV 270 The IANA is requested to assign a new value for BFD Reverse Path TLV 271 from the "Multiprotocol Label Switching Architecture (MPLS) Label 272 Switched Paths (LSPs) Ping Parameters - TLVs" registry, "TLVs and 273 sub-TLVs" sub-registry. 275 +--------+----------------------+---------------+ 276 | Value | Description | Reference | 277 +--------+----------------------+---------------+ 278 | (TBD1) | BFD Reverse Path TLV | This document | 279 +--------+----------------------+---------------+ 281 Table 1: New BFD Reverse Type TLV 283 6.2. Return Code 285 The IANA is requested to assign a new Return Code value from the 286 "Multi-Protocol Label Switching (MPLS) Label Switched Paths (LSPs) 287 Ping Parameters" registry, "Return Codes" sub-registry, as follows 288 using a Standards Action value. 290 +--------+----------------------------------------------+-----------+ 291 | Value | Description | Reference | 292 +--------+----------------------------------------------+-----------+ 293 | (TBD3) | Inappropriate Target FEC Stack sub-TLV | This | 294 | | present. | document | 295 | (TBD4) | Failed to establish the BFD session. The | This | 296 | | specified reverse path was not found. | document | 297 +--------+----------------------------------------------+-----------+ 299 Table 2: New Return Code 301 7. Implementation Status 303 - The organization responsible for the implementation: ZTE 304 Corporation. 306 - The implementation's name ROSng empowers traditional routers, e.g., 307 ZXCTN 6000. 309 - A brief general description: A Return Path can be specified for a 310 BFD session over RSVP tunnel or LSP. Same can be specified for a 311 backup RSVP tunnel/LSP. 313 The implementation's level of maturity: production. 315 - Coverage: RSVP LSP (no support for Static LSP) 317 - Version compatibility: draft-ietf-mpls-bfd-directed-10. 319 - Licensing: proprietary. 321 - Implementation experience: simple once you support RFC 7110. 323 - Contact information: Qian Xin qian.xin2@zte.com.cn 325 - The date when information about this particular implementation was 326 last updated: 12/16/2019 328 Note to RFC Editor: This section MUST be removed before publication 329 of the document. 331 8. Security Considerations 333 Security considerations discussed in [RFC5880], [RFC5884], [RFC7726], 334 and [RFC8029], apply to this document. 336 9. Normative References 338 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 339 Requirement Levels", BCP 14, RFC 2119, 340 DOI 10.17487/RFC2119, March 1997, 341 . 343 [RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection 344 (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010, 345 . 347 [RFC5881] Katz, D. and D. Ward, "Bidirectional Forwarding Detection 348 (BFD) for IPv4 and IPv6 (Single Hop)", RFC 5881, 349 DOI 10.17487/RFC5881, June 2010, 350 . 352 [RFC5883] Katz, D. and D. Ward, "Bidirectional Forwarding Detection 353 (BFD) for Multihop Paths", RFC 5883, DOI 10.17487/RFC5883, 354 June 2010, . 356 [RFC5884] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow, 357 "Bidirectional Forwarding Detection (BFD) for MPLS Label 358 Switched Paths (LSPs)", RFC 5884, DOI 10.17487/RFC5884, 359 June 2010, . 361 [RFC7110] Chen, M., Cao, W., Ning, S., Jounay, F., and S. Delord, 362 "Return Path Specified Label Switched Path (LSP) Ping", 363 RFC 7110, DOI 10.17487/RFC7110, January 2014, 364 . 366 [RFC7726] Govindan, V., Rajaraman, K., Mirsky, G., Akiya, N., and S. 367 Aldrin, "Clarifying Procedures for Establishing BFD 368 Sessions for MPLS Label Switched Paths (LSPs)", RFC 7726, 369 DOI 10.17487/RFC7726, January 2016, 370 . 372 [RFC8029] Kompella, K., Swallow, G., Pignataro, C., Ed., Kumar, N., 373 Aldrin, S., and M. Chen, "Detecting Multiprotocol Label 374 Switched (MPLS) Data-Plane Failures", RFC 8029, 375 DOI 10.17487/RFC8029, March 2017, 376 . 378 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 379 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 380 May 2017, . 382 Appendix A. Acknowledgments 384 Authors greatly appreciate thorough review and the most helpful 385 comments from Eric Gray and Carlos Pignataro. Authors greatly 386 appreciate the help of Qian Xin, who provided the information about 387 the implementation of this specification. 389 Authors' Addresses 391 Greg Mirsky 392 ZTE 394 Email: gregimirsky@gmail.com 396 Jeff Tantsura 397 Nuage Networks 399 Email: jefftant.ietf@gmail.com 401 Ilya Varlashkin 402 Google 404 Email: Ilya@nobulus.com 406 Mach(Guoyi) Chen 407 Huawei 409 Email: mach.chen@huawei.com