One document matched: draft-hares-idr-flowspec-v2-00.txt
IDR Working Group S. Hares
Internet-Draft Huawei
Intended status: Standards Track June 25, 2016
Expires: December 27, 2016
BGP Flow Specification Version 2
draft-hares-idr-flowspec-v2-00.txt
Abstract
BGP flow specification version 1 (RFC5575) describes the distribution
of traffic filter policy (traffic filters and actions) which are
distributed via BGP to BGP peers. Three applications utilize this
traffic filter policy: (1) mitigation of Denial of Service (DoS), (2)
enabling of traffic filtering in BGP/MPLS VPNS, and (3)centralized
traffic control for networks with SDN or NFV controllers.
Application of centralized traffic utilizing BGP Flow Specification
traffic filters may need user-ordered filters rather than RFC5575's
strict ordering of filters and defined ordering of actions.
This document proposes a new BGP Flow specification version 2 that
supports user-order of filters and actions plus allowing more actions
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 27, 2016.
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
Hares Expires December 27, 2016 [Page 1]
Internet-Draft BGP FlowSpec v2 June 2016
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. RFC5575 vs. NETCONF/RESTCONF/I2RS Flow Filters . . . . . 4
2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1. Definitions and Acronyms . . . . . . . . . . . . . . . . 6
2.2. RFC 2119 language . . . . . . . . . . . . . . . . . . . . 6
3. Dissemination of BGP Flow Specification version 2 NLRI and
Wide Communities . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Encoding of BGP-FS v2 Filters . . . . . . . . . . . . . . 7
3.2. Encoding of BGP-FS v2 Actions . . . . . . . . . . . . . . 7
3.3. Required NLRI Validation . . . . . . . . . . . . . . . . 8
4. Optional Security Additions . . . . . . . . . . . . . . . . . 8
4.1. BGP FS v2 and BGPSEC . . . . . . . . . . . . . . . . . . 9
4.2. BGP FS v2 with with ROA . . . . . . . . . . . . . . . . . 9
4.3. Revise Flow Specification Security for centralized Server 9
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
6. Security Considerations . . . . . . . . . . . . . . . . . . . 11
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
7.1. Normative References . . . . . . . . . . . . . . . . . . 11
7.2. Informative References . . . . . . . . . . . . . . . . . 13
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction
BGP flow specification [RFC5575] describes the distribution of
filters and actions that apply when packets are received on a router
with the flow specification function turned on. If one considers the
reception of the packet as an event, then BGP flow specification
describes a set of minimalistic Event-MatchCondition-Action (ECA)
policies were the match-condition is defined in the BGP NLRI, and the
action is defined either by the default condition (accept traffic) or
actions defined in Extended BGP Communiites values [RFC4360].
The initial set of policy [RFC5575] and [RFC7674] for this policy
includes 12 types of match filters encoded in two application
specific AFI/SAFIs for the IPv4 AFI.
IP traffic: AFI:1, SAFI, 133;
Hares Expires December 27, 2016 [Page 2]
Internet-Draft BGP FlowSpec v2 June 2016
BGP/MPLS VPN AFI:1 VPN SAFI, 134) for IPv4.
The popularity of these flow specification filters in deployment for
DoS and SDN/NFV has led to the requirement for more BGP flow
specification match filters in the NLRI and more BGP flow
specification actions.
This document describes distribution of two new BGP Flow
Specification NLRI (2 AFI/SAFI pairs) that allow user-ordered list of
traffic match filters, and user-ordered traffic match actions encoded
in BGP Wide Communities.
o section 2 - Definitions,
o section 3 - Rules for dissemination of Flow Specification v2,
o section 4 - Optional Security,
o section 5 - IANA considerations,
o section 6 - security considerations.
The rest of this section provides background on BGP Flow
Specification filters interaction with I2RS Filter-Based RIBs carried
by NETCONF/RESTCONF protocol. Figure 1 below is a logial description
of BGP Flow Specification rules that combine filters in BGP NLRI with
actions in BGP Extended communities.
Hares Expires December 27, 2016 [Page 3]
Internet-Draft BGP FlowSpec v2 June 2016
+-----------------------------+
| Flow Specification (FS) |
| Policy |
+-----------------------------+
^ ^
| |
| |
+--------^-------+ +-------^-------+
| FS Rule | | FS Rule |
+----------------+ +---------------+
: :
: :
......: :.....
: :
+---------V---------+ +----V-------------+
| Rule Condition | | Rule Action |
| in BGP NLRIs | | in BGP extended |
| SAFI 133, 134 | | Communities |
+-------------------+ +------------------+
: : : : : :
.....: . :..... .....: . :.....
: : : : : :
+----V---+ +---V----+ +--V---+ +-V------+ +--V-----++--V---+
| Match | | match | |match | | Action | | action ||action|
|Operator| |Variable| |Value | |Operator| |variable|| Value|
|*1 | | | | | |(subtype| | || |
+--------+ +--------+ +------+ +--------+ +--------++------+
*1 match operator may be complex.
Figure 1: BGP Flow Specification Policy
BGP Flow Specification (BGP-FS) ([RFC5575] and
[I-D.raszuk-idr-rfc5575bis]) describes how to distribute the BGP Flow
Specification policy as BGP routes which are locally configured on
the originating BGP peer. Like BGP routes, if the BGP peer session
drops then BGP Flow Specification routes are dropped. [RFC5575] and
[I-D.raszuk-idr-rfc5575bis] do not indicate how the BGP Flow
Specification policy is installed in the kernel.
1.1. RFC5575 vs. NETCONF/RESTCONF/I2RS Flow Filters
[RFC5575] describes the dissemination of flow specification rules
policy is similar to the the statically configured Filter-Based RIB
described in [I-D.ietf-i2rs-fb-rib-data-model], and the I2RS Filter-
Based RIB ([I-D.ietf-i2rs-fb-rib-info-model],
[I-D.ietf-i2rs-fb-rib-data-model],
[I-D.ietf-i2rs-pkt-eca-data-model]). These FB-RIBs start on the
Hares Expires December 27, 2016 [Page 4]
Internet-Draft BGP FlowSpec v2 June 2016
reception of a packet using match filters to match frames (L2) or
packet data (L3/L4/Application), and perform actions as shown in
figure 2.
+-----------+ +------------+
|Rule Group | | Rule Group |
+-----------+ +------------+
^ ^
| |
| |
+--------^-------+ +-------^-----------+
| Rule | | Rule |
+----------------+ +-------------------+
: : : :
:.................: : : :
: |.........: : :
+--V--+ +--V--+ : :
| name| |order| .........: :.....
+-----+ +-----+ : :
: :
+--------------V-------+ +--V------------+
| Rule Match condition | | Rule Action |
+----------------------+ +---------------+
: : : : : :
.....: . :..... .....: . :.....
: : : : : :
+----V---+ +---V----+ +--V---+ +-V------++--V-----++--V---+
| Match | | match | |match | | Action || action ||action|
|Operator| |variable| |Value | |Operator||Variable|| Value|
+--------+ +--------+ +------+ +--------++--------++------+
Figure 2: I2RS Filter-Based RIB Policy
[I-D.ietf-i2rs-fb-rib-data-model] suggests that the storage of BGP
Flow Specification routes in the kernel should utilize the same
format as the statically configured FB-RIB and the I2RS ephemeral FB-
RIB so that these traffic filters may be compared. This draft also
proposes that precedence between these three sources of filters in
the kernel (statically configured, I2RS ephemeral, and BGP ephemeral
routes) can either set by local policy or defaults. If it is set by
defaults [I-D.ietf-i2rs-fb-rib-data-model] suggests the default
precedence between static, I2RS, and BGP-FS installed filters is:
o static FB-RIB -highest precedence (wins all ties)
o I2RS FB-RIB - middle preference (wins over BGP-FS originated
routes, loses to static FB-RIB),
Hares Expires December 27, 2016 [Page 5]
Internet-Draft BGP FlowSpec v2 June 2016
o BGP-FS installed Filters - lows preference (loses to static and
I2RS FB-RIB)
2. Definitions
2.1. Definitions and Acronyms
NETCONF: The Network Configuration Protocol [RFC6241].
RESTconf - http programmatic protocol to access yang modules
[I-D.ietf-netconf-restconf]
BGPSEC - secure BGP [I-D.ietf-sidr-bgpsec-protocol].
I2RS - Interface to Routing System [I-D.ietf-i2rs-architecture].
BGP Session ephemeral state - state which does not survive the
loss of BGP peer,
Ephemeral state - state which does not survive the reboot of a
software module, or a hardware reboot. Ephemeral state can be
ephemeral configuration state or operational state.
configuration state - state which persist across a reboot of
software module within a routing systsem or a reboot of a hardware
routing device.
2.2. RFC 2119 language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Dissemination of BGP Flow Specification version 2 NLRI and Wide
Communities
The BGP Flow Specification version 2 (BGP-FS v2) uses an NRLI with
the format for AFI/SAFI (SAFI = TBD) for IP flow, and AFI/SAFI for
BGP/MPLS (SAFI = TBD). This NLRI information is encoded using
MP_READ_NRI and MP_UNREACH_NLRI attributes defined in [RFC4760].
Whenever the corresponding application does not require Next-HOP
information, this shall be encoded as zero-octet length Next Hop in
the MP_REAC_NLRI and ignored upon receipt.
Implementatinos wishing to exchange flow specificastion rules MUST
use BGP's Capability Advertisement facility to exchange the
Multiprotocol Extension Capability Code (Code 1) as defined in
[RFC4760].
Hares Expires December 27, 2016 [Page 6]
Internet-Draft BGP FlowSpec v2 June 2016
3.1. Encoding of BGP-FS v2 Filters
The AFI/SAFI NLRI for BGP Flow Specification has the format
+------------------------+
|length (2 octets) |
+------------------------+
| Sub-TLVs (variable) |
| +====================+ |
| | order (2 octets) | |
| +--------------------+ |
| | type (2 octets) | |
| +--------------------+ |
| | length (2 octets) | |
| +--------------------+ |
| | value (variable) | |
| |[multiples of | |
| | 2 octets] | |
| +====================+ |
+------------------------+
Figure 16 - NRLI revision
where:
o length - is the length of the NLRI,
o Sub-TLVs contain a user-ordered set of filter components as
defined in [RFC5575] and [I-D.raszuk-idr-rfc5575bis]. The ranges
are defined as: standard BGP Flow Specification filters (types
0x01 - 0x3FFFF), and vendor specific filters (types 0x4ffff to
0x7FFFF) with type values 0x8000 to 0xFFFFFFFF reserved for future
use. Each sub-tlv has an length of 2 octets, and a variable
length value (in multiples of 2 octets).
Filters are process in the order specified by the user. If multiple
filters exist for the same order, the strict filter ordering defined
in [RFC5575] and [I-D.raszuk-idr-rfc5575bis] will be used for the
filters with the same value for user order.
3.2. Encoding of BGP-FS v2 Actions
The BGP-FS version 2 actions are passed in a Wide Community
[I-D.ietf-idr-wide-bgp-communities] atom with the following format.
Hares Expires December 27, 2016 [Page 7]
Internet-Draft BGP FlowSpec v2 June 2016
+--------------------------+
| order (2 octets) |
+--------------------------+
| Action type (2 octets) |
+--------------------------+
| Action length (2 octets) |
+--------------------------+
| Action Values (variable) |
| (multiples of 2 octets) |
+--------------------------+
Wide Community Atom
figure 17
where:
o Action type (2 octets) - is the type of action. These actions can
be standardized (0x0001 - 0x3ffff), vendor specific
(0x40000-0x7FFFF), or reserved (0x0, 0x80000-0xFFFFFFFF).
o Action length - length of actions including variable field,
o Action values - value of actions (variable) defined in individual
definitions.
The BGP Flow Specification (BGP-FS) atom can be part of the Wide
Community container (type 1) or the BGP Flow Specification Atom can
be part of the BGP Flow Specification container (type 2) which will
have:
+-----------------------------+
| Source AS Number (4 octets)|
+-----------------------------+
| list of atoms (variable) |
+-----------------------------+
figure 18
3.3. Required NLRI Validation
Same as [RFC5575] and [I-D.raszuk-idr-rfc5575bis].
4. Optional Security Additions
This section discusses the optional BGP Security additions for BGP-FS
v2: BGPSEC [I-D.ietf-sidr-bgpsec-protocol], ROA [RFC6482] and revised
security for flow specification distributed from a centralized server
within an AS [I-D.ietf-idr-bgp-flowspec-oid]. These optional
security parameters can be applied per BGP peer.
Hares Expires December 27, 2016 [Page 8]
Internet-Draft BGP FlowSpec v2 June 2016
4.1. BGP FS v2 and BGPSEC
[RFC5575] does not require BGP Flow specifications to be passed
BGPSEC [I-D.ietf-sidr-bgpsec-protocol]. BGP FS v2 can be passed in
BGPSEC, but it is not required.
4.2. BGP FS v2 with with ROA
BGP-FS v2 can utilize ROAs in the validation. If BGP-FS v2 is used
with BGPSEC and ROA, the first thing is to vaildate the route within
BGPSEC and second to utilize BGP ROA to validate the route origin.
The BGP-FS peers using both ROA and BGP-FS validation determine that
a BGP Flow specification is valid if and only if one of the following
cases:
o If the BGP Flow Specification NLRI has a IPv4 or IPv6 address in
destination address match filter and the following is true:
* A BGP ROA has been received to validate the originator, and
* the route is the best-match unicast route for the destination
prefix embedded in the match filter; or
o If a BGP ROA has not been received that matches the IPv4 or IPv6
destination address in the destination filter, the match filter
must abide by the [RFC5575] validation rules of:
* The originator match of the flow specification matches the
originator of the best-match unicast route for the destination
prefix filter embedded in the flow specification", and
* No more specific unicast routes exist when compared with the
flow destination prefix that have been received from a
different neighboring AS than the best-match unicast route,
which has been determined in step A.
The best match is defined to be the longest-match NLRI with the
highest preference.
4.3. Revise Flow Specification Security for centralized Server
The distribution of Flow Specifications from a centralized server
supports mitigation of DoS attacks. [I-D.ietf-idr-bgp-flowspec-oid]
suggests the following redefined procedure for validation for this
case:
A route is valid if the following conditions holds true:
Hares Expires December 27, 2016 [Page 9]
Internet-Draft BGP FlowSpec v2 June 2016
o The originator of the flow specification matches the originator of
the best-match unicast route for the destination prefix embedded
in the flow specification.
o The AS_PATH and AS4_PATH attribute of the flow specification are
empty (on originating AS)
o The AS_PATH and AS4_PATH attribute of the flow specification does
not contain AS_SET and AS_SEQUENCE segments (on originating AS
with AS Confederation)
This reduced validation mechanism can be used for BGP-FS v2 within a
single domain.
5. IANA Considerations
This section complies with [RFC7153]
This document requests:
SAFI be defined for IPv4 (AFI = 1), IPv6 (AFI=2), L2VPN (AFI=25)
for BGP-FS
SAFI be defined for BGP/MPLS IPv4 (AFI = 1), IPv6 (AFI=2), L2VPN
(AFI=25) for BGP-FS
Registry be created for BGP-FS V2 filter component types with the
following ranges:
0x00 - reserved
0x01 - 0x3FFFF - standards action
0x40000- 0x7FFFF - vendor specific filters
0x80000 -0xFFFFFFFF - reserved
0x80000 -0xFFFFFFFF - reserved
Registry be created for BGP-FS v2 action types with the following
ranges:
0x0 - reserved
0x01 - 0x3ffff - standards action
0x40000 - 0x7ffff - vendor actions
Hares Expires December 27, 2016 [Page 10]
Internet-Draft BGP FlowSpec v2 June 2016
0x80000 - 0xFFFFFFF - reserved
6. Security Considerations
The use of ROA improves on [RFC5575] to check the route orgination is
valid can improve the validation sequence for a multiple-AS
environment. The use of BGPSEC [I-D.ietf-sidr-bgpsec-protocol] to
secure the packet can increase security of BGP flow specification
information sent in the packet.
The use of the reduced validation within an AS
[I-D.ietf-idr-bgp-flowspec-oid] can provide adequate validation for
distribution of flow specification within an single autonomous system
for prevention of DDOS.
Distribution of flow filters may provide insight into traffic being
sent within an AS, but this information should be composite
information that does not reveal the traffic patterns of individuals.
7. References
7.1. Normative References
[I-D.ietf-idr-bgp-flowspec-oid]
Uttaro, J., Filsfils, C., Smith, D., Alcaide, J., and P.
Mohapatra, "Revised Validation Procedure for BGP Flow
Specifications", draft-ietf-idr-bgp-flowspec-oid-03 (work
in progress), March 2016.
[I-D.ietf-idr-wide-bgp-communities]
Raszuk, R., Haas, J., Lange, A., Amante, S., Decraene, B.,
Jakma, P., and R. Steenbergen, "Wide BGP Communities
Attribute", draft-ietf-idr-wide-bgp-communities-02 (work
in progress), May 2016.
[I-D.ietf-sidr-bgpsec-protocol]
Lepinski, M. and K. Sriram, "BGPsec Protocol
Specification", draft-ietf-sidr-bgpsec-protocol-17 (work
in progress), June 2016.
[I-D.raszuk-idr-rfc5575bis]
Raszuk, R., McPherson, D., Mauch, J., Greene, B., and S.
Hares, "Dissemination of Flow Specification Rules", draft-
raszuk-idr-rfc5575bis-00 (work in progress), June 2016.
Hares Expires December 27, 2016 [Page 11]
Internet-Draft BGP FlowSpec v2 June 2016
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
Border Gateway Protocol 4 (BGP-4)", RFC 4271,
DOI 10.17487/RFC4271, January 2006,
<http://www.rfc-editor.org/info/rfc4271>.
[RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended
Communities Attribute", RFC 4360, DOI 10.17487/RFC4360,
February 2006, <http://www.rfc-editor.org/info/rfc4360>.
[RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
"Multiprotocol Extensions for BGP-4", RFC 4760,
DOI 10.17487/RFC4760, January 2007,
<http://www.rfc-editor.org/info/rfc4760>.
[RFC4761] Kompella, K., Ed. and Y. Rekhter, Ed., "Virtual Private
LAN Service (VPLS) Using BGP for Auto-Discovery and
Signaling", RFC 4761, DOI 10.17487/RFC4761, January 2007,
<http://www.rfc-editor.org/info/rfc4761>.
[RFC4762] Lasserre, M., Ed. and V. Kompella, Ed., "Virtual Private
LAN Service (VPLS) Using Label Distribution Protocol (LDP)
Signaling", RFC 4762, DOI 10.17487/RFC4762, January 2007,
<http://www.rfc-editor.org/info/rfc4762>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>.
[RFC5575] Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J.,
and D. McPherson, "Dissemination of Flow Specification
Rules", RFC 5575, DOI 10.17487/RFC5575, August 2009,
<http://www.rfc-editor.org/info/rfc5575>.
[RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
and A. Bierman, Ed., "Network Configuration Protocol
(NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
<http://www.rfc-editor.org/info/rfc6241>.
[RFC6482] Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
Origin Authorizations (ROAs)", RFC 6482,
DOI 10.17487/RFC6482, February 2012,
<http://www.rfc-editor.org/info/rfc6482>.
Hares Expires December 27, 2016 [Page 12]
Internet-Draft BGP FlowSpec v2 June 2016
[RFC7153] Rosen, E. and Y. Rekhter, "IANA Registries for BGP
Extended Communities", RFC 7153, DOI 10.17487/RFC7153,
March 2014, <http://www.rfc-editor.org/info/rfc7153>.
[RFC7223] Bjorklund, M., "A YANG Data Model for Interface
Management", RFC 7223, DOI 10.17487/RFC7223, May 2014,
<http://www.rfc-editor.org/info/rfc7223>.
[RFC7674] Haas, J., Ed., "Clarification of the Flowspec Redirect
Extended Community", RFC 7674, DOI 10.17487/RFC7674,
October 2015, <http://www.rfc-editor.org/info/rfc7674>.
7.2. Informative References
[I-D.ietf-i2rs-architecture]
Atlas, A., Halpern, J., Hares, S., Ward, D., and T.
Nadeau, "An Architecture for the Interface to the Routing
System", draft-ietf-i2rs-architecture-15 (work in
progress), April 2016.
[I-D.ietf-i2rs-ephemeral-state]
Haas, J. and S. Hares, "I2RS Ephemeral State
Requirements", draft-ietf-i2rs-ephemeral-state-10 (work in
progress), June 2016.
[I-D.ietf-i2rs-fb-rib-data-model]
Hares, S., Kini, S., Dunbar, L., Krishnan, R., Bogdanovic,
D., and R. White, "Filter-Based RIB Data Model", draft-
ietf-i2rs-fb-rib-data-model-00 (work in progress), June
2016.
[I-D.ietf-i2rs-fb-rib-info-model]
Kini, S., Hares, S., Dunbar, L., Ghanwani, A., Krishnan,
R., Bogdanovic, D., and R. White, "Filter-Based RIB
Information Model", draft-ietf-i2rs-fb-rib-info-model-00
(work in progress), June 2016.
[I-D.ietf-i2rs-pkt-eca-data-model]
Hares, S., Wu, Q., and R. White, "Filter-Based Packet
Forwarding ECA Policy", draft-ietf-i2rs-pkt-eca-data-
model-00 (work in progress), June 2016.
[I-D.ietf-netconf-restconf]
Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
Protocol", draft-ietf-netconf-restconf-13 (work in
progress), April 2016.
Hares Expires December 27, 2016 [Page 13]
Internet-Draft BGP FlowSpec v2 June 2016
[I-D.ietf-netmod-acl-model]
Bogdanovic, D., Koushik, K., Huang, L., and D. Blair,
"Network Access Control List (ACL) YANG Data Model",
draft-ietf-netmod-acl-model-07 (work in progress), March
2016.
[RFC6074] Rosen, E., Davie, B., Radoaca, V., and W. Luo,
"Provisioning, Auto-Discovery, and Signaling in Layer 2
Virtual Private Networks (L2VPNs)", RFC 6074,
DOI 10.17487/RFC6074, January 2011,
<http://www.rfc-editor.org/info/rfc6074>.
[RFC6483] Huston, G. and G. Michaelson, "Validation of Route
Origination Using the Resource Certificate Public Key
Infrastructure (PKI) and Route Origin Authorizations
(ROAs)", RFC 6483, DOI 10.17487/RFC6483, February 2012,
<http://www.rfc-editor.org/info/rfc6483>.
Author's Address
Susan Hares
Huawei
7453 Hickory Hill
Saline, MI 48176
USA
Email: shares@ndzh.com
Hares Expires December 27, 2016 [Page 14]
| PAFTECH AB 2003-2026 | 2026-04-24 02:48:17 |