draft-ietf-lsr-ospf-prefix-originator-03.txt   draft-ietf-lsr-ospf-prefix-originator-04.txt 
LSR Working Group A. Wang LSR Working Group A. Wang
Internet-Draft China Telecom Internet-Draft China Telecom
Intended status: Standards Track A. Lindem Intended status: Standards Track A. Lindem
Expires: February 28, 2020 Cisco Systems Expires: March 15, 2020 Cisco Systems
J. Dong J. Dong
Huawei Technologies Huawei Technologies
P. Psenak P. Psenak
K. Talaulikar K. Talaulikar
Cisco Systems Cisco Systems
August 27, 2019 September 12, 2019
OSPF Extension for Prefix Originator OSPF Prefix Originator Extension
draft-ietf-lsr-ospf-prefix-originator-03 draft-ietf-lsr-ospf-prefix-originator-04
Abstract Abstract
This document describes Open Shortest Path First (OSPF) v2 and OSPFv3 This document defines Open Shortest Path First (OSPF) encodings to
encodings to advertise the router-id of the originator of inter-area advertise the router-id of the originator of inter-area prefixes for
prefixes for OSPFv2 and OSPFv3 Link-State Advertisement (LSA), which OSPFv2 and OSPFv3 Link-State Advertisements (LSAs). The source
are needed in several use cases in multi-area OSPF use cases. originator is needed in several multi-area OSPF use cases.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on February 28, 2020. This Internet-Draft will expire on March 15, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 15 skipping to change at page 2, line 15
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions used in this document . . . . . . . . . . . . . . 3 2. Conventions used in this document . . . . . . . . . . . . . . 3
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Conventions used in this document . . . . . . . . . . . . . . 4 4. Inter-Area Prefix Source Advertisement Use Cases . . . . . . 4
5. Scenario Description . . . . . . . . . . . . . . . . . . . . 4 5. Prefix Source Router-ID sub-TLV . . . . . . . . . . . . . . . 5
6. Prefix Source Router-ID sub-TLV . . . . . . . . . . . . . . . 5 6. Elements of Procedure . . . . . . . . . . . . . . . . . . . . 6
7. Extended LSA Elements of Procedure . . . . . . . . . . . . . 6 7. Security Considerations . . . . . . . . . . . . . . . . . . . 6
8. Security Considerations . . . . . . . . . . . . . . . . . . . 6 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 9. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 7
10. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 7 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 7
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 10.1. Normative References . . . . . . . . . . . . . . . . . . 7
11.1. Normative References . . . . . . . . . . . . . . . . . . 7 10.2. Informative References . . . . . . . . . . . . . . . . . 9
11.2. Informative References . . . . . . . . . . . . . . . . . 8
Appendix A. Inter-Area Topology Retrieval Process . . . . . . . 9 Appendix A. Inter-Area Topology Retrieval Process . . . . . . . 9
Appendix B. Special Considerations on Inter-Area Topology Appendix B. Special Considerations on Inter-Area Topology
Retrieval . . . . . . . . . . . . . . . . . . . . . 9 Retrieval . . . . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10
1. Introduction 1. Introduction
[I-D.ietf-ospf-mpls-elc] defines mechanisms to Entropy Readable Label [I-D.ietf-ospf-mpls-elc] defines mechanisms to advertise Entropy
Depth (ERLD) for ingress Label Switching Router (LSR) to discover Readable Label Depth (ERLD) for ingress Label Switching Routers (LSR)
each LSR's capability of performing Entropy Label (EL) -based load- to discover other LSR's capability of performing Entropy Label based
balancing in Multi Protocol Label Switch (MPLS) networks. The load-balancing in MPLS networks. The ingress LSR can use this
ingress LSR can use this information to push the appropriate label information to construct the appropriate label stack for specific
stack for specific traffic, especially in segment routing traffic requirements, especially in segment routed networks and other
environments and other stacked LSPs scenarios. deployments requiring stacked LSPs.
However, in inter-area scenarios, the Area Border Router (ABR) does However, in inter-area scenarios, the Area Border Router (ABR) does
not advertise the originating OSPF router-id for inter-area prefixes. not advertise the originating OSPF router-id for inter-area prefixes.
An OSPF router in one area doesn't know where the prefixes really An OSPF router in one area doesn't know the origin area of inter-area
came from and can't determine the router that originated inter-area prefixes and can't determine the router that originated these
prefixes and then can't judge the ERLD capabilities of the prefixes or the ERLD capabilities of the destination. Therefore, it
destination. It is necessary to transfer the originator information is necessary to advertise the originator of these inter-area prefixes
of these inter-area prefixes to ensure the ingress LSR constructs the to ensure the ingress LSR can construct the appropriate label stack.
right label stack.
More generally, [RFC8476] defines a mechanism to advertise multiple More generally, [RFC8476] defines a mechanism to advertise multiple
types of supported Maximum SID Depths (MSD) at node and/or link types of supported Maximum SID Depths (MSD) at node and/or link
granularity. This information will be referred when the head-end granularity. This information will be referred when the head-end
router starts to send traffic to destination prefixes. In inter-area router starts to send traffic to destination prefixes. In inter-area
scenario, it is also necessary for the sender to learn the scenario, it is also necessary for the sender to learn the
capabilities of the receivers associated with the inter-area capabilities of the receivers associated with the inter-area
prefixes. prefixes.
There is also another scenario where knowing the originator of inter- There is another scenario where knowing the originator of inter-area
area prefixes is useful. For example, Border Gateway Protocol Link- prefixes is useful. For example, Border Gateway Protocol Link-State
State (BGP-LS) [RFC7752] describes mechanisms using the BGP protocol (BGP-LS) [RFC7752] describes mechanisms using the BGP protocol to
to advertise Link-State information. This can enable an Software advertise Link-State information. This information can enable a
Definition Network (SDN) controller to collect the underlay network Software Definition Network (SDN) controller to automatically
topology automatically. determine the underlay network topology.
But if the underlay network is divided into multiple areas and However, if the underlay network is partitioned into multiple areas
running the OSPF protocol, it is not easy for the SDN controller to and running the OSPF protocol, it is not easy for the SDN controller
rebuild the multi-area topology, because normally an ABR that to rebuild the multi-area topology since ABR that connects multiple
connects multiple areas will hide the detailed topology information areas will normally hide the detailed topology for these non-backbone
for these non-backbone areas. If only the internal routers within areas. If only the internal routers within backbone area run the
backbone area run the BGP-LS protocol, they just learn and report the BGP-LS protocol, they just learn and report the summary network
summary network information from the non-backbone areas. If the SDN information from the non-backbone areas. If the SDN controller can
controller can learn the originator of the inter-area prefixes, it is learn the originator of the inter-area prefixes, it is possible to
possible to rebuild the inter-area topology automatically. rebuild the inter-area topology.
[RFC7794] introduces the Intermediate System to Intermediate System [RFC7794] introduces the Intermediate System to Intermediate System
(IS-IS) "IPv4/IPv6 Source Router IDs" Type-Length-Value (TLV) to (IS-IS) "IPv4/IPv6 Source Router IDs" Type-Length-Value (TLV) to
advertise the source of the prefixes redistributed from a different advertise the source of prefixes leaked from a different IS-IS level.
IS-IS level. This TLV can be used in the above scenarios. Such This TLV can be used in the above scenarios. Such solution can also
solution can also be applied in networks that run the OSPF protocol, be applied in networks that run the OSPF protocol, but existing OSPF
but the related LSAs TLV must be extended. LSAs TLVs must be extended to include the router originating the
prefix.
This draft provides such solution for the OSPFv2 and OSPFv3 This draft provides such solution for the OSPFv2 and OSPFv3
protocols. protocols.
2. Conventions used in this document 2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
document are to be interpreted as described in [RFC2119] . "OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
3. Terminology 3. Terminology
The following terms are used in this document: The following terms are used in this document:
o ABR: Area Border Router o ABR: Area Border Router
o ERLD: Entropy Readable Label Depth o ERLD: Entropy Readable Label Depth
o EL: Entropy Label o EL: Entropy Label
skipping to change at page 4, line 18 skipping to change at page 4, line 18
o MSD: Maximum SID Depths o MSD: Maximum SID Depths
o NLRI: Network Layer Reachability Information o NLRI: Network Layer Reachability Information
o OSPF: Open Shortest Path First o OSPF: Open Shortest Path First
o SID: Segment IDentifier o SID: Segment IDentifier
o SDN: Software Definition Network o SDN: Software Definition Network
4. Conventions used in this document 4. Inter-Area Prefix Source Advertisement Use Cases
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119] .
5. Scenario Description
Figure 1 illustrates the topology scenario when OSPF is running in Figure 1 illustrates a topology where OSPF is running in multiple
multi-area. R0-R4 are routers in backbone area, S1-S4,T1-T4 are areas. R0-R4 are routers in the backbone area, S1-S4 are internal
internal routers in area 1 and area 2 respectively. R1 and R3 are routers in area 1, and T1-T4 are internal routers in area 2. R1 and
area border routers between area 0 and area 1. R2 and R4 are area R3 are ABRs between area 0 and area 1. R2 and R4 are ABRs between
border routers between area 0 and area 2. N1 is the network between area 0 and area 2. N1 is the network between router S1 and S2 and N2
router S1 and S2 and N2 is the network between router T1 and T2. Ls1 is the network between router T1 and T2. Ls1 is the loopback address
is the loopback address of Node S1 and Lt1 is the loopback address of of Node S1 and Lt1 is the loopback address of Node T1.
Node T1.
+-----------------+ +-----------------+
|IP SDN Controller| |IP SDN Controller|
+--------+--------+ +--------+--------+
| |
| BGP-LS | BGP-LS
| |
+---------------------+------+--------+-----+--------------+ +---------------------+------+--------+-----+--------------+
| +--+ +--+ ++-+ ++-+ +-++ + -+ +--+| | +--+ +--+ ++-+ ++-+ +-++ + -+ +--+|
| |S1+--------+S2+---+R1+---|R0+----+R2+---+T1+--------+T2|| | |S1+--------+S2+---+R1+---|R0+----+R2+---+T1+--------+T2||
skipping to change at page 5, line 27 skipping to change at page 4, line 50
| +-++ +-++ ++-+ +-++ ++++ +-++| | +-++ +-++ ++-+ +-++ ++++ +-++|
| |S4+--------+S3+---+R3+-----------+R4+---+T3+--------+T4|| | |S4+--------+S3+---+R3+-----------+R4+---+T3+--------+T4||
| +--+ +--+ ++-+ +-++ ++-+ +--+| | +--+ +--+ ++-+ +-++ ++-+ +--+|
| | | | | | | |
| | | | | | | |
| Area 1 | Area 0 | Area 2 | | Area 1 | Area 0 | Area 2 |
+---------------------+---------------+--------------------+ +---------------------+---------------+--------------------+
Figure 1: OSPF Inter-Area Prefix Originator Scenario Figure 1: OSPF Inter-Area Prefix Originator Scenario
If S1 wants to send traffic to prefix Lt1 that is connected T1 in If S1 wants to send traffic to prefix Lt1 that is connected to T1 in
another area, it should know the ERLD, and MSD values that are another area, it should know the ERLD and MSD values associated with
associated with the node T1, and then construct the right label stack the node T1, and then construct the right label stack at the ingress
at the ingress node for the target traffic. node for traffic destined to prefix Lt1.
In another scenario, If R0 has some method to learn the originator of In another scenario, If R0 has some method to learn the originator of
network N1 and reports such information to IP SDN controller, then it network N1 and reports such information to IP SDN controller, then it
is possible for the controller to retrieval the topology in non- is possible for the controller to reconstruct the topology in the
backbone area. The topology retrieval process and its usage non-backbone areas. The topology reconstruction process and its
limitation are described in the Appendix A and Appendix B . limitations are described in the Appendix A and Appendix B.
From the above scenarios, we can conclude it is useful to introduce From the above scenarios, we can conclude it is useful to define the
and define the prefix originator sub TLV within OSPF. OSPF prefix originator sub TLV .
6. Prefix Source Router-ID sub-TLV 5. Prefix Source Router-ID sub-TLV
[RFC7684] and [RFC8362] define the TLV extensions for OSPFv2 and [RFC7684] and [RFC8362] respectively define TLV-based LSAs for OSPFv2
OSPFv3 respectively. These documents facilitate addition of new and OSPFv3. These documents facilitate addition of new attributes
attributes for prefixes. Based on these formats, we can define new for prefixes and provide the basis for a sub-TLV to advertise the
sub-TLV to advertise the "Prefix Source Router ID", as that defined "Prefix Source Router ID". For OSPFv2, this sub-TLV is a sub-TLV of
in [RFC7794]. OSPFv2 Extended Prefix TLV which SHOULD be included in the "OSPFv2
Extended Prefix Opaque LSA" [RFC7684] for inter-area prefixes. For
OSPFv3, this sub-TLV is a sub-TLV of "Inter-Area-Prefix TLV", which
SHOULD be included in the "E-Inter-Area-Prefix-LSA" [RFC8362].
The "Prefix Source Router-ID" sub-TLV has the following format: The "Prefix Source Router-ID" sub-TLV has the following format:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | | Type | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Prefix Source Router-ID | | Prefix Source Router-ID |
+---------------------------------------------------------------+ +---------------------------------------------------------------+
Figure 2: Prefix Source Router-ID sub-TLV Format Figure 2: Prefix Source Router-ID sub-TLV Format
o Source Router-ID Sub-TLV Type: TBD1[RFC7684] or TBD2 [RFC8362] o Source Router-ID Sub-TLV Type: TBD1 [RFC7684] or TBD2 [RFC8362]
o Length: 4 o Length: 4
o Value: Router-ID of OSPFv2/OSPFv3 source router o Value: Router-ID of OSPFv2/OSPFv3 router that is the source of the
prefix.
For OSPFv2, this sub-TLV is a sub-TLV of OSPFv2 Extended Prefix TLV, This sub-TLV provides the same functionality as the IS-IS "IPv4/IPv6
which SHOULD be included in the "OSPFv2 Extended Prefix Opaque LSA" . Source Router" TLV defined in [RFC7794].
For OSPFv3, this sub-TLV is a sub-TLV of "Inter-Area-Prefix TLV", 6. Elements of Procedure
which SHOULD be included in the "E-Inter-Area-Prefix-LSA".
7. Extended LSA Elements of Procedure When an ABR, for example R2 in Figure 1, receives a Router-LSA
advertisement in area 2, it SHOULD originate the corresponding
"OSPFv2 Extended Prefix Opaque LSA" for OSPFv2 or "E-Inter-Area-
Prefix-LSA" for OSPFv3 that includes the Source Router-ID sub-TLV for
the network prefixes. For example, to identify the source router
prefix Lt1 and other inter-area prefixes in Figure 1.
When an ABR, for example R2 in Figure 1, receives the Router-LSA When a router in another area, e.g., S1, receives such LSA, it then
announcement in area 2, it should originate the corresponding "OSPFv2 can ascertain that prefix Lt1 is associated with node T1 and obtain
Extended Prefix Opaque LSA" for OSPFv2 or "E-Inter-Area-Prefix-LSA" the ERLD or MSD value from T1's Router-Information LSA [RFC7770] and
for OSPFv3 that includes the Source Router-ID sub-TLV for the network construct the right label stack at the ingress node S1 for traffic
prefixes, e.g., for prefix Lt1, N2. etc., which identifies the source destined to prefix Lt1.
router that advertised the prefix.
When S1 in another area receives such LSA, it then can learn that When a router in another area, e.g., R0, receives such LSA, it learns
prefix Lt1 is associated with node T1, check the ERLD, or MSD value the Prefix Source Router-id and includes it in the prefix information
according to its necessity, and construct the right label stack at advertised to an SDN controller as described in
the ingress node S1 for the traffic destined to Lt1. [I-D.ietf-idr-bgp-ls-segment-routing-ext]. The SDN controller can
then use such information to build the inter-area topology according
to the process described in the Appendix A. The topology retrieval
process may not suitable for some environments as stated in
Appendix B.
When R0 receives such LSA, it learns the Prefix Source Router-id and 7. Security Considerations
includes it in the prefix information advertised to an SDN controller
as described in[I-D.ietf-idr-bgp-ls-segment-routing-ext]. The SDN
controller can then use such information to build the inter-area
topology according to the process described in the Appendix A. The
topology retrieval process may not suitable for some environments as
stated in Appendix B.
8. Security Considerations Since this document extends the "OSPFv2 Extended Prefix LSA" and
"OSPFv3 E-Inter-Area-Prefix LSA", the security considerations for
[RFC7684] and [RFC8362] are applicable.
Security concerns for OSPF are addressed in [RFC5709] Modification of the "Prefix Source Sub-TLV" could be used for a
Advertisement of the additional information defined in this document Denial-of-Service attack and could inhibit the use cases described in
introduces no new security concerns Section 4. If the OSPF domain is vulnerable to such attacks, OSPF
authentication should be used as defined for OSPFv2 in [RFC5709] and
[RFC7474] and for OSPFv3 in [RFC7166].
9. IANA Considerations Additionally, advertisement of the prefix source for inter-area
prefixes facilitates reconstruction of the OSPF topology for other
areas. Network operators may consider their topologies to be
sensitive confidential data. For OSPFv3, IPsec can be used to
provide confidentiality [RFC4552]. Since there is no standard
defined for native OSPFv2 IPsec, some form of secure tunnel is
required to provide confidentiality.
This specification defines one Prefix Source Router-ID sub-TLV as 8. IANA Considerations
described in Section 6. This value should be added to the existing
"OSPFv2 Extended Prefix TLV Sub-TLVs" registry and "OSPFv3 Extended-
LSA Sub-TLVs registry" respectively.
The following new sub-TLV is added to the registry of "OSPFv2 This specification defines the Prefix Source Router-ID sub-TLV as
Extended Prefix TLV Sub-TLVs". The allocation policy is IETF Review described in Section 5. This value should be added to the both
that defined in [RFC7684] existing "OSPFv2 Extended Prefix TLV Sub-TLVs" and "OSPFv3 Extended-
LSA Sub-TLVs" registries.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++ The following sub-TLV is added to the "OSPFv2 Extended Prefix TLV
| Code Point | Description | Status | Sub-TLVs" registry. The allocation policy is IETF Review as defined
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++ in [RFC7684]
| TBD | Prefix Source Sub-TLV | Allocation from IANA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++
Figure 3: CodePoint in "OSPFv2 Extended Prefix TLV Sub-TLVs"
The following new sub-TLV is added to the registry of "OSPFv3 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Extended-LSA Sub-TLVs". The allocation policy is IETF Review that | Code Point | Description | Status |
defined in [RFC8362] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TBD | Prefix Source Sub-TLV | Allocation from IANA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: Code Point in "OSPFv2 Extended Prefix TLV Sub-TLVs"
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++ The following sub-TLV is added to the "OSPFv3 Extended-LSA Sub-TLVs"
| Code Point | Description | Status | registry. The allocation policy is IETF Review as defined in
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++ [RFC8362]
| TBD | Prefix Source Sub-TLV | Allocation from IANA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++++++++
Figure 4: CodePoint in "OSPFv3 Extended-LSA Sub-TLVs"
10. Acknowledgement +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Code Point | Description | Status |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TBD | Prefix Source Sub-TLV | Allocation from IANA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: Code Point in "OSPFv3 Extended-LSA Sub-TLVs"
Many thanks to Les Ginsberg for his valuable suggestions on this 9. Acknowledgement
draft. And also thanks Jeff Tantsura,Rob Shakir, Van De Velde
Gunter, Goethals Dirk, Shaofu Peng, John E Drake for their valuable
comments on this draft.
11. References Many thanks to Les Ginsberg for his suggestions on this draft. Also
thanks to Jeff Tantsura, Rob Shakir, Gunter Van De Velde, Goethals
Dirk, Shaofu Peng, and John E Drake for their valuable comments.
11.1. Normative References 10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC4552] Gupta, M. and N. Melam, "Authentication/Confidentiality
for OSPFv3", RFC 4552, DOI 10.17487/RFC4552, June 2006,
<https://www.rfc-editor.org/info/rfc4552>.
[RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M., [RFC5709] Bhatia, M., Manral, V., Fanto, M., White, R., Barnes, M.,
Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic Li, T., and R. Atkinson, "OSPFv2 HMAC-SHA Cryptographic
Authentication", RFC 5709, DOI 10.17487/RFC5709, October Authentication", RFC 5709, DOI 10.17487/RFC5709, October
2009, <https://www.rfc-editor.org/info/rfc5709>. 2009, <https://www.rfc-editor.org/info/rfc5709>.
[RFC7166] Bhatia, M., Manral, V., and A. Lindem, "Supporting
Authentication Trailer for OSPFv3", RFC 7166,
DOI 10.17487/RFC7166, March 2014,
<https://www.rfc-editor.org/info/rfc7166>.
[RFC7474] Bhatia, M., Hartman, S., Zhang, D., and A. Lindem, Ed.,
"Security Extension for OSPFv2 When Using Manual Key
Management", RFC 7474, DOI 10.17487/RFC7474, April 2015,
<https://www.rfc-editor.org/info/rfc7474>.
[RFC7684] Psenak, P., Gredler, H., Shakir, R., Henderickx, W., [RFC7684] Psenak, P., Gredler, H., Shakir, R., Henderickx, W.,
Tantsura, J., and A. Lindem, "OSPFv2 Prefix/Link Attribute Tantsura, J., and A. Lindem, "OSPFv2 Prefix/Link Attribute
Advertisement", RFC 7684, DOI 10.17487/RFC7684, November Advertisement", RFC 7684, DOI 10.17487/RFC7684, November
2015, <https://www.rfc-editor.org/info/rfc7684>. 2015, <https://www.rfc-editor.org/info/rfc7684>.
[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and [RFC7770] Lindem, A., Ed., Shen, N., Vasseur, JP., Aggarwal, R., and
S. Ray, "North-Bound Distribution of Link-State and S. Shaffer, "Extensions to OSPF for Advertising Optional
Traffic Engineering (TE) Information Using BGP", RFC 7752, Router Capabilities", RFC 7770, DOI 10.17487/RFC7770,
DOI 10.17487/RFC7752, March 2016, February 2016, <https://www.rfc-editor.org/info/rfc7770>.
<https://www.rfc-editor.org/info/rfc7752>.
[RFC7794] Ginsberg, L., Ed., Decraene, B., Previdi, S., Xu, X., and [RFC7794] Ginsberg, L., Ed., Decraene, B., Previdi, S., Xu, X., and
U. Chunduri, "IS-IS Prefix Attributes for Extended IPv4 U. Chunduri, "IS-IS Prefix Attributes for Extended IPv4
and IPv6 Reachability", RFC 7794, DOI 10.17487/RFC7794, and IPv6 Reachability", RFC 7794, DOI 10.17487/RFC7794,
March 2016, <https://www.rfc-editor.org/info/rfc7794>. March 2016, <https://www.rfc-editor.org/info/rfc7794>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8362] Lindem, A., Roy, A., Goethals, D., Reddy Vallem, V., and [RFC8362] Lindem, A., Roy, A., Goethals, D., Reddy Vallem, V., and
F. Baker, "OSPFv3 Link State Advertisement (LSA) F. Baker, "OSPFv3 Link State Advertisement (LSA)
Extensibility", RFC 8362, DOI 10.17487/RFC8362, April Extensibility", RFC 8362, DOI 10.17487/RFC8362, April
2018, <https://www.rfc-editor.org/info/rfc8362>. 2018, <https://www.rfc-editor.org/info/rfc8362>.
[RFC8476] Tantsura, J., Chunduri, U., Aldrin, S., and P. Psenak, [RFC8476] Tantsura, J., Chunduri, U., Aldrin, S., and P. Psenak,
"Signaling Maximum SID Depth (MSD) Using OSPF", RFC 8476, "Signaling Maximum SID Depth (MSD) Using OSPF", RFC 8476,
DOI 10.17487/RFC8476, December 2018, DOI 10.17487/RFC8476, December 2018,
<https://www.rfc-editor.org/info/rfc8476>. <https://www.rfc-editor.org/info/rfc8476>.
11.2. Informative References 10.2. Informative References
[I-D.ietf-idr-bgp-ls-segment-routing-ext] [I-D.ietf-idr-bgp-ls-segment-routing-ext]
Previdi, S., Talaulikar, K., Filsfils, C., Gredler, H., Previdi, S., Talaulikar, K., Filsfils, C., Gredler, H.,
and M. Chen, "BGP Link-State extensions for Segment and M. Chen, "BGP Link-State extensions for Segment
Routing", draft-ietf-idr-bgp-ls-segment-routing-ext-16 Routing", draft-ietf-idr-bgp-ls-segment-routing-ext-16
(work in progress), June 2019. (work in progress), June 2019.
[I-D.ietf-ospf-mpls-elc] [I-D.ietf-ospf-mpls-elc]
Xu, X., Kini, S., Psenak, P., Filsfils, C., and S. Xu, X., Kini, S., Psenak, P., Filsfils, C., and S.
Litkowski, "Signaling Entropy Label Capability and Entropy Litkowski, "Signaling Entropy Label Capability and Entropy
Readable Label-stack Depth Using OSPF", draft-ietf-ospf- Readable Label-stack Depth Using OSPF", draft-ietf-ospf-
mpls-elc-08 (work in progress), May 2019. mpls-elc-09 (work in progress), September 2019.
[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and
S. Ray, "North-Bound Distribution of Link-State and
Traffic Engineering (TE) Information Using BGP", RFC 7752,
DOI 10.17487/RFC7752, March 2016,
<https://www.rfc-editor.org/info/rfc7752>.
Appendix A. Inter-Area Topology Retrieval Process Appendix A. Inter-Area Topology Retrieval Process
When an IP SDN Controller receives this information, it should When an IP SDN Controller receives BGP-LS [RFC7752] information, it
compare the prefix Network Layer Reachability Information (NLRI) that should compare the prefix Network Layer Reachability Information
included in the BGP-LS packet. When it encounters the same prefix (NLRI) that is included in the BGP-LS NLRI. When it encounters the
but with different source router ID, it should extract the same prefix but with different source router ID, it should extract
corresponding area-ID, rebuild the link between these two different the corresponding area-ID, rebuild the link between these two source
source routers in non-backbone area. Belows is one example that routers in the non-backbone area. Below is one example that based on
based on the Figure 1: the Figure 1:
Assuming we want to rebuild the connection between router S1 and Assuming we want to rebuild the connection between router S1 and
router S2 that locates in area 1: router S2 located in area 1:
a. Normally, router S1 will advertise prefix N1 within its router- a. Normally, router S1 will advertise prefix N1 within its router-
LSA. LSA.
b. When this router-LSA reaches the ABR router R1, it will convert b. When this router-LSA reaches the ABR router R1, it will convert
it into summary-LSA, add the Prefix Source Router-ID sub-TLV, it into summary-LSA, add the Prefix Source Router-ID sub-TLV,
which is router id of S1 in this example. which is router id of S1 in this example.
c. R1 then floods this extension summary-LSA to R0, which is running c. R1 then floods this extension summary-LSA to R0, which is using
BGP-LS protocol with IP SDN Controller. The controller then the BGP-LS protocol with IP SDN Controller. The controller then
knows the prefixes of N1 is from S1. knows the prefix for N1 is from S1.
d. Router S2 will do the similar process, and the controller will d. Router S2 will perform a similar process, and the controller will
also learn that prefixes N1 is also from S2. also learn that prefix N1 is also from S2.
e. Then it can reconstruct the link between S1 and S2, using the e. Then it can reconstruct the link between S1 and S2, using the
prefix N1. The topology within Area 1 can then be reconstructed prefix N1. The topology within Area 1 can then be reconstructed
accordingly. accordingly.
Iterating the above process continuously, the IP SDN controller can Iterating the above process continuously, the IP SDN controller can
retrieve a detailed topology that spans multiple areas. retrieve a detailed topology that spans multiple areas.
Appendix B. Special Considerations on Inter-Area Topology Retrieval Appendix B. Special Considerations on Inter-Area Topology Retrieval
The above topology retrieval process can be applied in the case where The above topology retrieval process can be applied in the case where
each link between routers is assigned a unique prefix. However, each point-to-point or multi-access link connecting routers is
there are some situations where this heuristic cannot be applied. assigned a unique prefix. However, there are some situations where
Specifically, the cases where the link is unnumbered or the prefix this heuristic cannot be applied. Specifically, the cases where the
corresponding to the link is an anycast prefix. link is unnumbered or the prefix corresponding to the link is an
anycast prefix.
The Appendix A heuristic to rebuild the topology can normally be used The Appendix A heuristic to rebuild the topology can normally be used
if all links are numbered. For anycast prefixes, if it corresponds if all links are numbered. For anycast prefixes, if it corresponds
to the loopback interface and has a host prefix length, i.e., 32 for to the loopback interface and has a host prefix length, i.e., 32 for
IPv4 prefixes and 128 for IPv6 prefixes, Appendix A can also apply. IPv4 prefixes and 128 for IPv6 prefixes, Appendix A can also applied
since these anycast prefixes are not required to reconstruct the
topology.
Authors' Addresses Authors' Addresses
Aijun Wang Aijun Wang
China Telecom China Telecom
Beiqijia Town, Changping District Beiqijia Town, Changping District
Beijing 102209 Beijing 102209
China China
Email: wangaj3@chinatelecom.cn Email: wangaj3@chinatelecom.cn
 End of changes. 53 change blocks. 
169 lines changed or deleted 205 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/