idnits 2.17.1 draft-ietf-mpls-lsr-self-test-05.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- ** It looks like you're using RFC 3978 boilerplate. You should update this to the boilerplate described in the IETF Trust License Policy document (see https://trustee.ietf.org/license-info), which is required now. -- Found old boilerplate from RFC 3978, Section 5.1 on line 22. -- Found old boilerplate from RFC 3978, Section 5.5 on line 545. ** This document has an original RFC 3978 Section 5.4 Copyright Line, instead of the newer IETF Trust Copyright according to RFC 4748. ** This document has an original RFC 3978 Section 5.5 Disclaimer, instead of the newer disclaimer which includes the IETF Trust according to RFC 4748. ** The document seems to lack an RFC 3979 Section 5, para. 1 IPR Disclosure Acknowledgement. ** The document seems to lack an RFC 3979 Section 5, para. 2 IPR Disclosure Acknowledgement. ** The document seems to lack an RFC 3979 Section 5, para. 3 IPR Disclosure Invitation. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- ** The document seems to lack a 1id_guidelines paragraph about Internet-Drafts being working documents. == The page length should not exceed 58 lines per page, but there was 13 longer pages, the longest (page 3) being 60 lines Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** There are 2 instances of too long lines in the document, the longest one being 4 characters in excess of 72. ** The abstract seems to contain references ([RSVP-TE], [LSP-Ping], [LDP]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the RFC 3978 Section 5.4 Copyright Line does not match the current year -- The document seems to lack a disclaimer for pre-RFC5378 work, but may have content which was first submitted before 10 November 2008. If you have contacted all the original authors and they are all willing to grant the BCP78 rights to the IETF Trust, then this is fine, and you can ignore this comment. If not, you may need to add the pre-RFC5378 disclaimer. (See the Legal Provisions document at https://trustee.ietf.org/license-info for more information.) -- The document date (July 2005) is 6859 days in the past. Is this intentional? -- Found something which looks like a code comment -- if you have code sections in the document, please surround them with '' and '' lines. Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) == Missing Reference: 'LDP' is mentioned on line 81, but not defined == Missing Reference: 'LSP-PING' is mentioned on line 306, but not defined == Unused Reference: 'RFC3036' is defined on line 488, but no explicit reference was found in the text ** Obsolete normative reference: RFC 3036 (Obsoleted by RFC 5036) -- Possible downref: Non-RFC (?) normative reference: ref. 'LSP-Ping' Summary: 10 errors (**), 0 flaws (~~), 5 warnings (==), 6 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 1 Network Working Group George Swallow 2 Internet Draft Cisco Systems, Inc. 3 Category: Standards Track 4 Expiration Date: January 2006 5 Kireeti Kompella 6 Juniper Networks, Inc. 8 Dan Tappan 9 Cisco Systems, Inc. 11 July 2005 13 Label Switching Router Self-Test 15 draft-ietf-mpls-lsr-self-test-05.txt 17 Status of this Memo 19 By submitting this Internet-Draft, each author represents that any 20 applicable patent or other IPR claims of which he or she is aware 21 have been or will be disclosed, and any of which he or she becomes 22 aware will be disclosed, in accordance with Section 6 of BCP 79. 24 This document is an Internet-Draft and is in full conformance with 25 all provisions of Section 5 of RFC3667. Internet-Drafts are working 26 documents of the Internet Engineering Task Force (IETF), its areas, 27 and its working groups. Note that other groups may also distribute 28 working documents as Internet-Drafts. 30 Internet-Drafts are draft documents valid for a maximum of six months 31 and may be updated, replaced, or obsoleted by other documents at any 32 time. It is inappropriate to use Internet-Drafts as reference 33 material or to cite them other than as "work in progress." 35 The list of current Internet-Drafts can be accessed at 36 http://www.ietf.org/1id-abstracts.html 38 The list of Internet-Draft Shadow Directories can be accessed at 39 http://www.ietf.org/shadow.html 41 Abstract 43 This document defines a means for a Label-Switching Router (LSR) 44 to verify that its dataplane is functioning for certain key Multi- 45 Protocol Label Switching (MPLS) applications, including unicast 46 forwarding based on LDP [LDP] and traffic engineering tunnels 47 based on [RSVP-TE]. A new Loopback FEC type is defined to allow 48 an upstream neighbor to assist in the testing at very low cost. 49 MPLS Echo Request and MPLS Echo Reply messages [LSP-Ping] are 50 extended to do the actual probing. 52 Contents 54 1 Introduction .............................................. 3 55 1.1 Conventions ............................................... 3 56 2 Loopback FEC .............................................. 4 57 2.1 IPv4 Loopback FEC Element ................................. 4 58 2.2 LDP Procedures ............................................ 5 59 3 Data Plane Self Test ...................................... 6 60 3.1 Data Plane Verification Request / Reply Messages .......... 7 61 3.2 UDP Port .................................................. 8 62 3.3 Reply-To Object ........................................... 8 63 3.3.1 IPv4 Reply-To Object ...................................... 9 64 3.3.2 IPv6 Reply-To Object ...................................... 9 65 3.4 Sending procedures ........................................ 10 66 3.5 Receiving procedures ...................................... 11 67 3.6 Upstream Neighbor Verification ............................ 11 68 4 Security Considerations ................................... 12 69 5 IANA Considerations ....................................... 12 70 6 Acknowledgments ........................................... 13 71 7 References ................................................ 13 72 7.1 Normative References ...................................... 13 73 7.2 Informative References .................................... 13 74 8 Authors' Addresses ........................................ 14 76 1. Introduction 78 This document defines a means for a Label-Switching Router (LSR) to 79 verify that its dataplane is functioning for certain key Multi-Proto- 80 col Label Switching (MPLS) applications, including unicast forwarding 81 based on LDP [LDP] and traffic engineering tunnels based on [RSVP- 82 TE]. MPLS Echo Request and MPLS Echo Reply messages [LSP-Ping] mes- 83 sages are extended to do the actual probing. The pings are sent to 84 an upstream neighbor, looped back through the LSR under test and 85 intercepted, by means of TTL expiration by a downstream neighbor. 86 Extensions to LSP-Ping [LSP-Ping] are defined to allow the down 87 stream neighbor to report the test results. 89 In order to minimize the load on upstream LSRs a new loopback FEC is 90 defined. Receipt of a packet labeled with a loopback label will cause 91 the advertising LSR to pop the label off the label stack and send the 92 packet out the advertised interface. 94 Note that use of a loopback allows an LSR to test label entries for 95 which the LSR is not currently some neighbor's next hop. In this way 96 label entries can be verified prior to the occurrence of a routing 97 change. 99 Some routing protocls, most notably OSPF have no means of exchanging 100 the "Link Local Identifiers" used to identify unnumbered links and 101 components of bundled links. These test procedures can be used to 102 associate the neighbor's interfaces with the probing LSRs interfaces. 103 This is achieved by simply having the TTL of the MPLS Ping expire one 104 hop sooner, i.e. at the testing LSR itself. 106 1.1. Conventions 108 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 109 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 110 document are to be interpreted as described in RFC 2119 [KEYWORDS]. 112 2. Loopback FEC 114 The Loopback FEC type is defined to enable an upstream neighbor to 115 assist in LSR self-testing at very low cost. This FEC causes the 116 loopback to occur in the dataplane without control plane involvement 117 beyond the initial LDP exchange and dataplane setup. The FEC also 118 carries information to indicate the desired encapsulation should it 119 be the only label in a received label stack. Values are defined for 120 IPv4 and IPv6. 122 An LSR uses a Loopback FEC to selectively advertise loopback labels 123 to its neighbor LSRs. Each loopback label is bound to a particular 124 interface. For multi-access links, a unique label for each neighbor 125 is required, since the link-level address is derived from the label 126 lookup. When an MPLS packet with its top label set to a loopback 127 label is received from an interface over which that label was adver- 128 tised, the loopback label is popped and the packet is sent on the 129 interface to which the loopback label was bound. If the label-stack 130 only contains the one loopback label, the encapsulation of the packet 131 is determined by the FEC Type. 133 TTL treatment for loopback labels follows the Uniform model. I.e. 134 the TTL carried in the loopback label is decremented and copied to 135 the exposed label or IP header as the case may be. 137 2.1. IPv4 Loopback FEC Element 139 FEC element type 130 is used. The FEC element is encoded as fol- 140 lows: (note: 130 is provisionally assigned, the actual value will be 141 assigned by IANA.) 143 0 1 2 3 144 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 145 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 146 | 130 | Res | If & Prot Type| Id Length | 147 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 148 | Interface Identifier | 149 | " | 150 | " | 151 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 152 Reserved (Res) 154 Must be set to zero on transmission and ignored on receipt. 156 Interface & Protocol Type 158 # Type Interface Identifier 159 --- ---- -------------------- 160 1 IPv4 Numbered IPv4 Address 161 2 IPv4 Unnumbered A 32 bit Link Identifier as 162 defined in [RFC3477] 163 3 IPv6 Numbered IPv6 Address 164 4 IPv6 Unnumbered A 32 bit Link Identifier as 165 defined in [RFC3477] 167 .in 9 168 Note that this type alos indicates the encapsulation type for payloads 169 that have a label stack contain the one loopback label. 171 Identifier Length 173 Length of the interface identifier in octets. The length is 4 174 bytes for the unnumbered types and IPv4, 16 bytes for IPv6. 176 Address 178 An identifier encoded according to the Identifier Type field. 180 2.2. LDP Procedures 182 It is RECOMMENDED that loopback labels only be distributed in 183 response to a Label Request message, irrespective of the label adver- 184 tisement mode of the LDP session. However it is recognized that in 185 certain cases such as OSPF with unnumbered links, the upstream LSR 186 may not have sufficiently detailed information of the neighbor's link 187 identifier to form the request. In these cases, the downstream LSR 188 will need to be configured to make unsolicited advertisements. 190 3. Data Plane Self Test 192 A self test operation involves three LSRs, the LSR doing the test, an 193 upstream neighbor and a downstream neighbor. We refer to these as 194 LSRs T, U, and D respectively. In order to minimize the processing 195 load on LSR-D, two new LSP Ping messages are defined, called the MPLS 196 Data Plane Verification Request and the MPLS Data Plane Verification 197 Reply. These messages are used to allow LSR-T to obtain the label 198 stack, address and interface information of LSR-D. 200 If FEC verification is required, the MPLS Echo Request and Reply mes- 201 sages are used. 203 The packet flow is shown below. Although the figure shows LSR-D adja- 204 cent to LSR-T it may in some cases be an arbitrary number of hops 205 away. 207 +-------+ +-------+ +-------+ 208 | ,-|-------| | 210 | | | | | | 211 | | | <-|-------| | 439 | | | | 440 +-------+ +-------+ 441 LSR-U LSR-T 443 DPVRq: MPLS Data Plane Verification Request 445 Figure 2: Upstream Neighbor Verification 447 No TLVs need to be included in the MPLS Data Plane Verification 448 Request. By noting the Sender's Handle and Sequence Number, as well 449 as the loopback label, LSR-T is able to detect that a) the packet was 450 looped, and b) determine (or verify) the interface on which the 451 packet was received. 453 4. Security Considerations 455 Were loopback labels widely known, they might be subject to abuse. 456 It is therefore RECOMMENDED that loopback labels only be shared 457 between trusted neighbors. Further, if the loopback labels are drawn 458 from the Global Label Space, or any other label space shared across 459 multiple LDP sessions, it is RECOMMENDED that all loopback labels be 460 filtered from a session except those labels pertaining to interfaces 461 directly connected to the neighbor participating in that session. 463 5. IANA Considerations 465 This document makes the following codepoint assigments (pending IANA 466 action): 468 Registry Codepoint Purpose 470 UDP Port tbd MPLS Verification Request 472 LSP Ping Message Type 3 MPLS Data Plane Verification 473 Request 474 LSP Ping Message Type 4 MPLS Data Plane Verification 475 Reply 476 LSP Ping Object Type 11 IPv4 Reply-to Object 477 LSP Ping Object Type 12 IPv6 Reply-to Object 479 6. Acknowledgments 481 The authors would like to thank Vanson Lim, Tom Nadeau, and Bob 482 Thomas for their comments and suggestions. 484 7. References 486 7.1. Normative References 488 [RFC3036] Andersson, L. et al., "LDP Specification", January 2001. 490 [LSP-Ping] Bonica, R. et al., "Detecting MPLS Data Plane Liveness", 491 work-in-progress. 493 [RFC3477] Kompella, K. & Y. Rekhter, "Signalling Unnumbered Links 494 in Resource ReSerVation Protocol - Traffic Engineering 495 (RSVP-TE)", January 2003. 497 [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate 498 Requirement Levels", BCP 14, RFC 2119, March 1997. 500 7.2. Informative References 502 [RSVP-TE] Awduche, D., et al, "RSVP-TE: Extensions to RSVP for LSP 503 tunnels", RFC 3209, December 2001. 505 8. Authors' Addresses 507 Kireeti Kompella 508 Juniper Networks, Inc. 509 1194 N. Mathilda Ave. 510 Sunnyvale, CA 94089 511 Email: kireeti@juniper.net 513 George Swallow 514 Cisco Systems, Inc. 515 1414 Massachusetts Ave 516 Boxborough, MA 01719 518 Email: swallow@cisco.com 520 Dan Tappan 521 Cisco Systems, Inc. 522 1414 Massachusetts Ave 523 Boxborough, MA 01719 525 Email: tappan@cisco.com 527 Copyright Notice 529 Copyright (C) The Internet Society (2005). This document is subject 530 to the rights, licenses and restrictions contained in BCP 78, and 531 except as set forth therein, the authors retain all their rights. 533 Expiration Date 535 January 2006 537 Disclaimer of Validity 539 This document and the information contained herein are provided on an 540 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 541 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 542 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 543 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 544 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES 545 OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.