One document matched: draft-bradford-pce-path-key-02.txt
Differences from draft-bradford-pce-path-key-01.txt
Networking Working Group Rich Bradford (Ed)
IETF Internet Draft JP Vasseur
Cisco Systems, Inc.
Adrian Farrel
Old Dog Consulting
Proposed Status: Standard
Expires: July 3, 2007
January 3, 2007
draft-bradford-pce-path-key-02.txt
Preserving Topology Confidentiality in Inter-Domain Path
Computation using a key based mechanism
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months
and may be updated, replaced, or obsoleted by other documents at
any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 3, 2007.
Bradford, Vasseur and Farrel 1
draft-bradford-pce-path-key-02.txt January 2007
Copyright Notice
Copyright (C) The IETF Trust (2007). All rights reserved.
Abstract
Multiprotocol Label Switching (MPLS) Traffic Engineering (TE)
Label Switched Paths (LSPs) may be computed by Path Computation
Elements (PCEs). Where the TE LSP crosses multiple domains, such
as Autonomous Systems (ASs), the path may be computed by multiple
PCEs that cooperate, with each responsible for computing a segment
of the path. However, in some cases (e.g. when ASs are
administered by separate Service Providers), it would break
confidentiality rules for a PCE to supply a path segment to a PCE
in another domain, thus disclosing internal topology information.
This issue may be circumvented by returning a loose hop and by
invoking a new path computation from the domain boundary LSR
during TE LSP setup as the LSP enters the second domain, but this
technique has several issues including the problem of maintaining
path diversity.
This document defines a mechanism to hide the contents of a
segment of a path, called the Confidential Path Segment (CPS). The
CPS may be replaced by a path-key that can be conveyed in the PCE
Communication Protocol (PCEP) and signaled within in a Resource
Reservation Protocol (RSVP) explicit route object.
Table of contents
1. Introduction.................................................3
2. Terminology..................................................4
3. Path-Key Solution............................................5
3.1. Mode of Operation...........................................5
4. PCEP Protocol Extensions.....................................6
4.1. PKS sub-object..............................................6
4.2. PKS bit.....................................................8
5. PCEP Mode of operation.......................................9
6. Security Considerations......................................9
7. Manageability Considerations................................10
8. IANA considerations.........................................10
9. Intellectual Property Considerations........................11
10. References.................................................11
10.1. Normative References.....................................11
10.2. Informational References.................................12
11. Authors' Addresses:........................................12
Bradford, Vasseur, and Farrel 2
draft-bradford-pce-path-key-02.txt January 2007
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
RFC-2119 [RFC2119].
1. Introduction
Path computation techniques using the Path Computation Element
(PCE) have been described in [PCE-ARCH] and allow for path
computation of inter-domain Multiprotocol Label Switching (MPLS)
traffic engineering (TE) Label Switched Paths (LSPs).
An important element of inter-domain TE is that TE information is
not shared between domains for scalability and confidentiality
reasons ([RFC4105] and [RFC4216]). Therefore, a single PCE is
unlikely to be able to compute a full inter-domain path.
Two path computation scenarios can be used for inter-domain TE
LSPs: one using per-domain path computation (defined in [PD-PATH-
COMP]), and the other using a PCE-based path computation technique
with cooperation between PCEs (as described in [PCE-ARCH]). In
this second case, paths for inter-domain LSPs can be computed by
cooperation between PCEs each of which computes a segment of the
path across one domain. Such a path computation procedure is
described in [BRPC].
If confidentiality is required between domains (such as would very
likely be the case between ASs belonging to different Service
Providers) then cooperating PCEs cannot exchange path segments or
else the receiving PCE and the Path Computation Client (PCC) will
be able to see the individual hops through another domain thus non
conforming to the confidentiality requirement stated in [RFC4105]
and [RFC4216]. We define the part of the path which we wish to
keep confidential as the Confidential Path Segment (CPS).
One mechanism for preserving the confidentiality of the CPS is for
the PCE to return a path containing a loose hop for the segment
internal to a domain that must be kept confidential. The concept
of loose hops for the route of a TE LSP is described in [RFC3209].
Bradford, Vasseur, and Farrel 3
draft-bradford-pce-path-key-02.txt January 2007
The Path Computation Element Communication Protocol (PCEP) defined
in [PCEP] supports the use of paths with loose hops, and it is a
local policy decision at a PCE whether it returns a full explicit
path or uses loose hops. Note that a Path computation Request may
request a loose or explicit path as detailed in [PCEP].
One option may consist of returning loose hop without further
extensions: if loose hops are used, the TE LSPs are signaled as
normal ([RFC3209]), and when a loose hop is encountered in the
explicit route it is resolved by performing a secondary path
computation to reach the next loose hop. Given the nature of the
cooperation between PCEs in computing the original path, this
secondary computation occurs at a Label Switching Router (LSR) at
a domain boundary (i.e. an ABR or ASBR) and the path is expanded
as described in [PD-PATH-COMP].
The PCE-based computation model is particularly useful for
determining mutually disjoint inter-domain paths such as might be
required for service protection. A single path computation request
is used. However, if loose hops are returned, the path of each TE
LSP must be recomputed at the domain boundaries as the TE LSPs are
signaled, and since the TE LSP signaling proceeds independently
for each TE LSP, disjoint paths cannot be guaranteed since the
LSRs in charge of expanding the EROs are not synchronized.
Therefore, using the loose hop technique without further
extensions, path segment confidentiality and path diversity are
mutually incompatible requirements.
This document defines the notion of a Path Key that is a token
that replaces a path segment in an explicit route. The Path Key is
encoded as a Path Key Sub-object (PKS) returned in the PCEP Path
Computation Reply message (PCReq) ([PCEP]). Upon receiving the
computed path, the PKS sub-object will be carried out in an RSVP-
TE Path message (RSVP-TE [RFC3209]) during signaling. The PKS may
also, optionally, be used in recorded routes in RSVP-TE.
2. Terminology
ASBR: border routers used to connect to another AS of a different
or the same Service Provider via one or more links inter-
connecting between ASs.
CPS: Confidential Path Segment. A segment of a path that contains
nodes and links that the AS policy requires to not be disclosed
outside the AS.
Bradford, Vasseur, and Farrel 4
draft-bradford-pce-path-key-02.txt January 2007
Inter-AS TE LSP: A TE LSP that crosses an AS boundary.
LSR: Label Switching Router.
LSP: Label Switched Path.
PCC: Path Computation Client: any client application requesting a
path computation to be performed by a Path Computation Element.
PCE: Path Computation Element: an entity (component, application
or network node) that is capable of computing a network path or
route based on a network graph and applying computational
constraints.
TE LSP: Traffic Engineering Label Switched Path
3. Path-Key Solution
The Path-Key solution may be applied in the PCE-based path
computation context as follows. A PCE computes a path segment
related to a particular domain and replaces it in the path
reported to the requesting PCC (or another PCE) by one or more
sub-objects referred to as the PKS. The entry and boundary LSR of
each CPS SHOULD be specified as hops in the returned path
immediately preceding the PKS, but where two PKSs are supplied in
sequence the entry node to the second MAY be encoded within the
first. The exit node of a CPS MAY be present as a strict hop
immediately following the PKS, but MAY also be hidden as part of
the PKS.
3.1. Mode of Operation
During path computation, when local policy dictates that
confidentiality must be preserved for all or part of the path
segment being computed or if explicitly requested by the Path
Computation Request, the PCE associates a path-key with the
computed path for the CPS, places its own identifier (its PCE-ID
as defined in [PCE-MONITORING]) along with the path-key in a PKS,
and inserts the PKS object in the path returned to the requesting
PCC or PCE immediately after the IPv4 sub-object defined in
[RFC3209]sub-object that identifies the LSR that will expand the
PKS into a explicit path hops. This will usually be the LSR that
is the start point of the CPS. The PCE that generates a PKS MUST
store the computed path segment and the path-key for later
Bradford, Vasseur, and Farrel 5
draft-bradford-pce-path-key-02.txt January 2007
retrieval. A local policy SHOULD be used to determine for how long
to retain such stored information, and whether to discard the
information after it has been queried using the procedures
described below. It is RECOMMENDED for a PCE to strore the PKS for
a period of 10 minutes.
TBD: Need to define the scope of the PKS and spell out the
restrictions on Path Key re-use.
A head-end LSR that is a PCC converts the path returned by a PCE
into an explicit route object (ERO) that it includes in the
Resource Reservation Protocol (RSVP) Path message. If the path
returned by the PCE contains PKSs these are included in the ERO.
Like any other sub-objects, the PKS is passed transparently from
hop to hop, until it becomes the first sub-object in the ERO. This
will occur at the start of the CPS which will usually be the
domain boundary. The PKS MUST be preceded by an ERO sub-object
that identifies the LSR that must expand the PKS, so the PKS will
not be encountered in ERO processing until the LSR that can
process it.
An LSR that encounters a PKS when trying to identify the next-hop
retrieves the PCE-ID from the PKS and sends a Path Computation
Request (PCReq) message as defined in [PCEP] to the PCE identified
by the PCE-ID that contains the path-key object .
Upon receiving the PCReq message, the PCE identifies the computed
path segment using the supplied path-key, and returns the
previously computed path segment in the form of explicit hops
using an ERO object contained in the Path Computation Reply
(PCReqp) as define in [PCEP] to the requesting node. The
requesting node inserts the explicit hops into the ERO and
continues to process the TE LSP setup as per [RFC3209].
4. PCEP Protocol Extensions
4.1. PKS sub-object
The PKS object format is identical as in [RSVP-PKS] but redefined
in the context of this document since a PCEP codepoint is
required.
Bradford, Vasseur, and Farrel 6
draft-bradford-pce-path-key-02.txt January 2007
The PKS is a fixed-length sub-object containing a Path-Key and a
PCE-ID. The Path Key is an identifier, or token used to represent
the CPS within the context of the PCE identified by the PCE-ID.
The PCE-ID identifies the PCE that can decode the Path Key using a
reachable IPv4 or IPv6 address of the PCE.
Because of the IPv4 and IPv6 variants, two sub-objects are defined
as follows.
PKS IPv4 sub-object
PKS Object-Class is to be assigned by IANA (recommended value=16)
PKS Object-Type is to be assigned by IANA (recommended value=1)
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|L| Type | Length | Path Key |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv4 address (4 bytes) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L
The L bit SHOULD NOT be set, so that the sub-object
represents a strict hop in the explicit route.
Type
TBD Path Key with IPv4 address
Length
The Length contains the total length of the subobject in
bytes, including the Type and Length fields. The Length is always
8.
IPv4 address
An IPv4 address of the PCE that can decode this key. The
address used SHOULD be an address of the PCE that is always
reachable, and MAY be an address that is restricted to the domain
in which the LSR that is called upon to expand the CPS lies.
PKS IPv6 sub-object
Bradford, Vasseur, and Farrel 7
draft-bradford-pce-path-key-02.txt January 2007
PKS Object-Class is to be assigned by IANA (recommended value=16)
PKS Object-Type is to be assigned by IANA (recommended value=2)
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|L| Type | Length | Path Key |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| IPv6 address (16 bytes) |
| |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L
As above.
Type
TBD Path Key with IPv6 address
Length
The Length contains the total length of the subobject in
bytes, including the Type and Length fields. The Length is always
20.
IPv6 address
An IPv6 address of the PCE that can decode this key. The
address used SHOULD be an address of the PCE that is always
reachable, but MAY be an address that is restricted to the domain
in which the LSR that is called upon to expand the CPS lies.
4.2. PKS bit
[PCEP] specifies the RP object that is used to specify various
characteristics of the path computation request.
In this document we define a new bit named the PKS bit defined as
follow:
Bradford, Vasseur, and Farrel 8
draft-bradford-pce-path-key-02.txt January 2007
PKS (PKS - 1 bit - Value=0x60): when set, the requesting PCC
requires the retrieval of a strict path segment that corresponds
to a PKS carried within the path computation request. The PKS bit
MUST be cleared when the path computation request is not related
to a CPS retrieval.
5. PCEP Mode of operation
The retrieval of the explicit path associated with a PKS by a PCC
is no different than any other path computation request with the
exception that the PCReq message MUST contain a PKS object and the
PKS bit of the RP object MUST the set.
If the receiving PCE cannot find any related strict path or the
retrieval of such strict path is not allowed by policy, the PCE
MUST send a PCRep message that contains a NO-PATH object.
Upon receipt of this negative reply, the requesting LSR MUST fail
the LSP setup and SHOULD use the procedures associated with loose
hop expansion failure [RFC3209].
6. Security Considerations
This document proposes tunneling secure topology information
across an untrusted AS, so the security considerations are many
and apply to PCEP and RSVP-TE.
Issues include:
- Security of the CPS (can other network elements probe for
expansion of path-keys, possibly at random?).
- Authenticity of the path-key (resilience to alteration by
intermediaries, resilience to fake expansion of path-keys).
- Resilience from DNS attacks (insertion of spurious path-keys;
flooding of bogus path-key expansion requests).
Most of the interactions required by this extension are point to
point, can be authenticated and made secure. These interactions
include the:
- PCC->PCE request
- PCE->PCE request(s)
- PCE->PCE response(s)
- PCE->PCC response
Bradford, Vasseur, and Farrel 9
draft-bradford-pce-path-key-02.txt January 2007
- LSR->LSR request and response (Note that a rogue LSR could
modify the ERO and insert or modify Path Keys. This would
result in an LSR (which is downstream in the ERO) sending
decode requests to a PCE. This is actually a larger problem
with RSVP. The rogue LSR is an existing issue with RSVP and
will not be addressed here.
- LSR->PCE request. Note that the PCE can check that the LSR
requesting the decode is the LSR at the head of the Path Key.
This largely contains the previous problem to DoS rather than
a security issue. A rogue LSR can issue random decode
requests, but these will amount only to DoS.
- PCE->LSR response.
Thus, the major security issues can be dealt with using standard
techniques for securing and authenticating pt-pt links. In
addition, it is recommended that the PCE providing a decode
response should check that the LSR that issued the decode request
is the head end of the decoded ERO segment.
7. Manageability Considerations
To be detailed in a further revision of this document.
8. IANA considerations
IANA assigns value to PCEP parameters. Each PCEP object has an
Object-Class and an Object-Type.
Two new PCEP objects are defined in this document: the IPv4 PKS
and the IPv6 PKS objects.
Object-Class Name
16 PKS IPv4
Object-Type
1
16 PKS IPv6
Object-Type
Bradford, Vasseur, and Farrel 10
draft-bradford-pce-path-key-02.txt January 2007
2
9. Intellectual Property Considerations
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology
described in this document or the extent to which any license
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights. Information on the procedures with respect to rights
in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention
any copyrights, patents or patent applications, or other
proprietary rights that may cover technology that may be required
to implement this standard. Please address the information to the
IETF at ietf-ipr@ietf.org.
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP Tunnels", RFC
3209, December 2001.
[PCEP] Vasseur, J.P., Le Roux, J.L., Ayyangar, A., Oki, E.,
Ikejiri, A., Atlas, A., Dolganow, A., "Path Computation Element
(PCE) communication Protocol (PCEP)", draft-vasseur-pce-pcep,
work in progress.
Bradford, Vasseur, and Farrel 11
draft-bradford-pce-path-key-02.txt January 2007
[RSVP-PKS] Bradford, R., Vasseur, J.P., Farrel, A., "RSVP
Extensions for Path Key Support", draft-bradford-ccamp-path-key-
ero, work in progress.
[PCE-MONITORING] Vasseur, J.P, "A set of monitoring tools for Path
Computation Element based Architecture", draft-vasseur-pce-
monitoring, work in progress.
10.2. Informational References
[PCE-ARCH] Farrel, A., Vasseur, J.P., Ash, J., "Path Computation
Element (PCE) Architecture", RFC4655, September 2006.
[PD-PATH-COMP] Vasseur, J., et al "A Per-domain path computation
method for establishing Inter-domain Traffic Engineering (TE)
Label
Switched Paths (LSPs)", draft-ietf-ccamp-inter-domain-pd-path-
comp, work in progress.
[BRPC] Vasseur, J., et al "A Backward Recursive PCE-based
Computation
(BRPC) procedure to compute shortest inter-domain Traffic
Engineering Label Switched Path", draft-ietf-pce-brpc, work in
progress.
[RFC4105] Le Roux, J., Vasseur, JP, Boyle, J., "Requirements
for Support of Inter-Area and Inter-AS MPLS Traffic Engineering",
RFC 4105, June 2005.
[RFC4216] Zhang, R., Vasseur, JP., et. al., "MPLS Inter-AS
Traffic Engineering requirements", RFC 4216, November 2005.
11. Authors' Addresses
Rich Bradford (Editor)
Cisco Systems, Inc.
1414 Massachusetts Avenue
Boxborough , MA - 01719
USA
Email: rbradfor@cisco.com
Bradford, Vasseur, and Farrel 12
draft-bradford-pce-path-key-02.txt January 2007
J.-P Vasseur
Cisco Systems, Inc.
1414 Massachusetts Avenue
Boxborough , MA - 01719
USA
Email: jpv@cisco.com
Adrian Farrel
Old Dog Consulting
EMail: adrian@olddog.co.uk
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Bradford, Vasseur, and Farrel 13
draft-bradford-pce-path-key-02.txt January 2007
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Bradford, Vasseur, and Farrel 14
| PAFTECH AB 2003-2026 | 2026-04-23 11:11:02 |