idnits 2.17.1 draft-ietf-mpls-lsr-self-test-04.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- ** It looks like you're using RFC 3978 boilerplate. You should update this to the boilerplate described in the IETF Trust License Policy document (see https://trustee.ietf.org/license-info), which is required now. -- Found old boilerplate from RFC 3979, Section 5, paragraph 1 on line 513. -- Found old boilerplate from RFC 3979, Section 5, paragraph 3 on line 526. ** The document seems to lack an RFC 3978 Section 5.1 IPR Disclosure Acknowledgement -- however, there's a paragraph with a matching beginning. Boilerplate error? ** This document has an original RFC 3978 Section 5.4 Copyright Line, instead of the newer IETF Trust Copyright according to RFC 4748. ** The document seems to lack an RFC 3978 Section 5.5 (updated by RFC 4748) Disclaimer -- however, there's a paragraph with a matching beginning. Boilerplate error? ** The document seems to lack an RFC 3979 Section 5, para. 2 IPR Disclosure Acknowledgement -- however, there's a paragraph with a matching beginning. Boilerplate error? Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- ** The document seems to lack a 1id_guidelines paragraph about Internet-Drafts being working documents. == The page length should not exceed 58 lines per page, but there was 12 longer pages, the longest (page 2) being 59 lines Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** The abstract seems to contain references ([RSVP-TE], [LSP-Ping], [LDP]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the RFC 3978 Section 5.4 Copyright Line does not match the current year == Line 355 has weird spacing: '...by this when ...' -- The document seems to lack a disclaimer for pre-RFC5378 work, but may have content which was first submitted before 10 November 2008. If you have contacted all the original authors and they are all willing to grant the BCP78 rights to the IETF Trust, then this is fine, and you can ignore this comment. If not, you may need to add the pre-RFC5378 disclaimer. (See the Legal Provisions document at https://trustee.ietf.org/license-info for more information.) -- The document date (February 2005) is 7000 days in the past. Is this intentional? -- Found something which looks like a code comment -- if you have code sections in the document, please surround them with '' and '' lines. Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) == Missing Reference: 'LDP' is mentioned on line 84, but not defined == Missing Reference: 'LSP-PING' is mentioned on line 244, but not defined == Unused Reference: 'RFC3036' is defined on line 451, but no explicit reference was found in the text ** Obsolete normative reference: RFC 3036 (Obsoleted by RFC 5036) -- Possible downref: Non-RFC (?) normative reference: ref. 'LSP-Ping' Summary: 8 errors (**), 0 flaws (~~), 6 warnings (==), 6 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 1 Network Working Group George Swallow 2 Internet Draft Cisco Systems, Inc. 3 Category: Standards Track 4 Expiration Date: August 2005 5 Kireeti Kompella 6 Juniper Networks, Inc. 8 Dan Tappan 9 Cisco Systems, Inc. 11 February 2005 13 Label Switching Router Self-Test 15 draft-ietf-mpls-lsr-self-test-04.txt 17 Status of this Memo 19 By submitting this Internet-Draft, the authors certify that any 20 applicable patent or other IPR claims of which we are aware have been 21 disclosed, and any of which we become aware will be disclosed, in 22 accordance with RFC 3668. 24 This document is an Internet-Draft and is in full conformance with 25 all provisions of Section 5 of RFC3667. Internet-Drafts are working 26 documents of the Internet Engineering Task Force (IETF), its areas, 27 and its working groups. Note that other groups may also distribute 28 working documents as Internet-Drafts. 30 Internet-Drafts are draft documents valid for a maximum of six months 31 and may be updated, replaced, or obsoleted by other documents at any 32 time. It is inappropriate to use Internet-Drafts as reference 33 material or to cite them other than as "work in progress." 35 The list of current Internet-Drafts can be accessed at 36 http://www.ietf.org/1id-abstracts.html 38 The list of Internet-Draft Shadow Directories can be accessed at 39 http://www.ietf.org/shadow.html 41 Copyright Notice 43 Copyright (C) The Internet Society (2005). 45 Abstract 46 This document defines a means of self test for a Label-Switching 47 Router (LSR) to verify that its dataplane is functioning for 48 certain key Multi-Protocol Label Switching (MPLS) applications 49 including unicast forwarding based on LDP [LDP] and traffic 50 engineering tunnels based on [RSVP-TE]. A new Loopback FEC type 51 is defined to allow an upstream neighbor to assist in the testing 52 at very low cost. MPLS Echo Request and MPLS Echo Reply messages 53 [LSP-Ping] are extended to do the actual probing. 55 Contents 57 1 Introduction .............................................. 3 58 1.1 Conventions ............................................... 3 59 2 Loopback FEC .............................................. 4 60 2.1 Loopback FEC Element ...................................... 4 61 2.2 LDP Procedures ............................................ 5 62 3 Data Plane Self Test ...................................... 5 63 3.1 Data Plane Verification Request / Reply Messages .......... 6 64 3.2 Reply-To Object ........................................... 8 65 3.2.1 IPv4 Reply-To Object ...................................... 8 66 3.2.2 IPv6 Reply-To Object ...................................... 8 67 3.3 Sending procedures ........................................ 9 68 3.4 Receiving procedures ...................................... 9 69 3.5 Upstream Neighbor Verification ............................ 10 70 4 Security Considerations ................................... 11 71 5 IANA Considerations ....................................... 11 72 6 Acknowledgments ........................................... 11 73 7 References ................................................ 11 74 7.1 Normative References ...................................... 11 75 7.2 Informative References .................................... 12 76 8 Authors' Addresses ........................................ 12 77 9 Full Copyright and Intellectual Property Statements ....... 12 79 1. Introduction 81 This document defines a means of self test for a Label-Switching 82 Router (LSR) to verify that its dataplane is functioning for certain 83 key Multi-Protocol Label Switching (MPLS) applications including uni- 84 cast forwarding based on LDP [LDP] and traffic engineering tunnels 85 based on [RSVP-TE]. MPLS Echo Request and MPLS Echo Reply messages 86 [LSP-Ping] messages are extended to do the actual probing. The pings 87 are sent to an upstream neighbor, looped back through the LSR under 88 test and intercepted, by means of TTL expiration by a downstream 89 neighbor. Extensions to LSP-Ping [LSP-Ping] are defined to allow the 90 down stream neighbor to report the test results. 92 In order to minimize the load on upstream LSRs a new loopback FEC is 93 defined. Receipt of a packet labeled with a loopback label will cause 94 the advertising LSR to pop the label off the label stack and send the 95 packet out the advertised interface. 97 Note that use of a loopback allows an LSR to test label entries for 98 which the LSR is not currently some neighbor's next hop. In this way 99 label entries can be verified prior to the occurrence of a routing 100 change. 102 Some routing protocls, most notably OSPF have no means of exchanging 103 the "Link Local Identifiers" used to identify unnumbered links and 104 components of bundled links. These test procedures can be used to 105 associate the neighbor's interfaces with the probing LSRs interfaces. 106 This is achieved by simply having the TTL of the MPLS Ping expire one 107 hop sooner, i.e. at the testing LSR itself. 109 1.1. Conventions 111 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 112 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 113 document are to be interpreted as described in RFC 2119 [KEYWORDS]. 115 2. Loopback FEC 117 The Loopback FEC type is defined to enable an upstream neighbor to 118 assist in LSR self-testing at very low cost. This FEC causes the 119 loopback to occur in the dataplane without control plane involvement 120 beyond the initial LDP exchange and dataplane setup. 122 An LSR uses the Loopback FEC to selectively advertise loopback labels 123 to its neighbor LSRs. Each loopback label is bound to a particular 124 interface. For multi-access links, a unique label for each neighbor 125 is required, since the link-level address is derived from the label 126 lookup. When an MPLS packet with its top label set to a loopback 127 label is received from an interface over which that label was adver- 128 tised, the loopback label is popped and the packet is sent on the 129 interface to which the loopback label was bound. 131 TTL treatment for loopback labels follows the Uniform model. I.e. 132 the TTL carried in the loopback label is decremented and copied to 133 the exposed label or IP header as the case may be. 135 2.1. Loopback FEC Element 137 FEC element type 130 is used. The FEC element is encoded as fol- 138 lows: (note: 130 is provisionally assigned, the actual value will be 139 assigned by IANA.) 141 0 1 2 3 142 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 143 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 144 | 130 | Res | Interface Type| Id Length | 145 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 146 | Interface Identifier | 147 | " | 148 | " | 149 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 151 Reserved (Res) 153 Must be set to zero on transmission and ignored on receipt. 155 Interface Type 157 # Type Interface Identifier 158 --- ---- -------------------- 159 0 Unnumbered A 32 bit Link Identifier as 160 defined in [RFC3477] 161 1 IPv4 Numbered IPv4 Address 162 2 IPv6 Numbered IPv6 Address 164 Identifier Length 166 Length of the interface identifier in octets. The length is 4 167 bytes for Unnumbered and IPv4, 16 bytes for IPv6. 169 Address 171 An identifier encoded according to the Identifier Type field. 173 2.2. LDP Procedures 175 It is RECOMMENDED that loopback labels only be distributed in 176 response to a Label Request message, irrespective of the label adver- 177 tisement mode of the LDP session. However it is recognized that in 178 certain cases such as OSPF with unnumbered links, the upstream LSR 179 may not have sufficiently detailed information of the neighbor's link 180 identifier to form the request. In these cases, the downstream LSR 181 will need to be configured to make unsolicited advertisements. 183 3. Data Plane Self Test 185 A self test operation involves three LSRs, the LSR doing the test, an 186 upstream neighbor and a downstream neighbor. We refer to these as 187 LSRs T, U, and D respectively. In order to minimize the processing 188 load on LSR-D, two new LSP Ping messages are defined, called the MPLS 189 Data Plane Verification Request and the MPLS Data Plane Verification 190 Reply. These messages are used to allow LSR-T to obtain the label 191 stack, address and interface information of LSR-D. 193 If FEC verification is required, the MPLS Echo Request and Reply mes- 194 sages are used. 196 The packet flow is shown below. Although the figure shows LSR-D adja- 197 cent to LSR-T it may in some cases be an arbitrary number of hops 198 away. 200 +-------+ +-------+ +-------+ 201 | ,-|-------| | 203 | | | | | | 204 | | | <-|-------| | 414 | | | | 415 +-------+ +-------+ 416 LSR-U LSR-T 418 DPVRq: MPLS Data Plane Verification Request 420 Figure 2: Upstream Neighbor Verification 422 No TLVs need to be included in the MPLS Data Plane Verification 423 Request. By noting the Sender's Handle and Sequence Number, as well 424 as the loopback label, LSR-T is able to detect that a) the packet was 425 looped, and b) determine (or verify) the interface on which the 426 packet was received. 428 4. Security Considerations 430 Were loopback labels widely known, they might be subject to abuse. 431 It is therefore RECOMMENDED that loopback labels only be shared 432 between trusted neighbors. Further, if the loopback labels are drawn 433 from the Global Label Space, or any other label space shared across 434 multiple LDP sessions, it is RECOMMENDED that all loopback labels be 435 filtered from a session except those labels pertaining to interfaces 436 directly connected to the neighbor participating in that session. 438 5. IANA Considerations 440 TBD 442 6. Acknowledgments 444 The authors would like to thank Vanson Lim, Tom Nadeau, and Bob 445 Thomas for their comments and suggestions. 447 7. References 449 7.1. Normative References 451 [RFC3036] Andersson, L. et al., "LDP Specification", January 2001. 453 [LSP-Ping] Bonica, R. et al., "Detecting MPLS Data Plane Liveness", 454 work-in-progress. 456 [RFC3477] Kompella, K. & Y. Rekhter, "Signalling Unnumbered Links 457 in Resource ReSerVation Protocol - Traffic Engineering 458 (RSVP-TE)", January 2003. 460 [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate 461 Requirement Levels", BCP 14, RFC 2119, March 1997. 463 7.2. Informative References 465 [RSVP-TE] Awduche, D., et al, "RSVP-TE: Extensions to RSVP for LSP 466 tunnels", RFC 3209, December 2001. 468 8. Authors' Addresses 470 Kireeti Kompella 471 Juniper Networks, Inc. 472 1194 N. Mathilda Ave. 473 Sunnyvale, CA 94089 474 Email: kireeti@juniper.net 476 George Swallow 477 Cisco Systems, Inc. 478 1414 Massachusetts Ave 479 Boxborough, MA 01719 481 Email: swallow@cisco.com 483 Dan Tappan 484 Cisco Systems, Inc. 485 1414 Massachusetts Ave 486 Boxborough, MA 01719 488 Email: tappan@cisco.com 490 9. Full Copyright and Intellectual Property Statements 492 Copyright (C) The Internet Society (2004). This document is subject 493 to the rights, licenses and restrictions contained in BCP 78, and 494 except as set forth therein, the authors retain all their rights. 496 This document and the information contained herein are provided on an 497 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 498 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 499 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 500 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFOR- 501 MATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES 502 OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 504 Intellectual Property 506 The IETF takes no position regarding the validity or scope of any 507 Intellectual Property Rights or other rights that might be claimed to 508 pertain to the implementation or use of the technology described in 509 this document or the extent to which any license under such rights 510 might or might not be available; nor does it represent that it has 511 made any independent effort to identify any such rights. Information 512 on the procedures with respect to rights in RFC documents can be 513 found in BCP 78 and BCP 79. 515 Copies of IPR disclosures made to the IETF Secretariat and any assur- 516 ances of licenses to be made available, or the result of an attempt 517 made to obtain a general license or permission for the use of such 518 proprietary rights by implementers or users of this specification can 519 be obtained from the IETF on-line IPR repository at 520 http://www.ietf.org/ipr. 522 The IETF invites any interested party to bring to its attention any 523 copyrights, patents or patent applications, or other proprietary 524 rights that may cover technology that may be required to implement 525 this standard. Please address the information to the IETF at ietf- 526 ipr@ietf.org. 528 Acknowledgement 530 Funding for the RFC Editor function is currently provided by the 531 Internet Society.