Network Working Group M. Chen Internet-Draft X. Xu Intended status: Standards Track Z. Li Expires: January 4, 2015 Huawei L. Fang Microsoft G. Mirsky Ericsson July 3, 2014 MultiProtocol Label Switching (MPLS) Source Label draft-chen-mpls-source-label-05 Abstract A MultiProtocol Label Switching (MPLS) label was originally defined to identify a Forwarding Equivalence Class (FEC), a packet is assigned to a specific FEC based on its network layer destination address. It's difficult or even impossible to derive the source identity information from the label. For some applications, source identification is a critical requirement. For example, performance monitoring, where the monitoring node needs to identify where a packet was sent from. This document introduces the concept of Source Label (SL) that is carried in the label stack and used to identify the ingress Label Switching Router (LSR) of an Label Switched Path (LSP). Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any Chen, et al. Expires January 4, 2015 [Page 1] Internet-Draft Source Label July 2014 time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 4, 2015. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Problem Statement and Introduction . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Source Label . . . . . . . . . . . . . . . . . . . . . . . . 4 4. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.1. Performance Measurement . . . . . . . . . . . . . . . . . 5 5. Data Plane Processing . . . . . . . . . . . . . . . . . . . . 6 5.1. Ingress LSR . . . . . . . . . . . . . . . . . . . . . . . 6 5.2. Transit LSR . . . . . . . . . . . . . . . . . . . . . . . 6 5.3. Egress LSR . . . . . . . . . . . . . . . . . . . . . . . 6 5.4. Penultimate Hop LSR . . . . . . . . . . . . . . . . . . . 6 6. Source Label Signaling . . . . . . . . . . . . . . . . . . . 7 6.1. Source Label Capability Signaling . . . . . . . . . . . . 7 6.1.1. LDP Extensions . . . . . . . . . . . . . . . . . . . 7 6.1.2. BGP Extensions . . . . . . . . . . . . . . . . . . . 8 6.1.3. IGP Extensions . . . . . . . . . . . . . . . . . . . 9 6.2. Source Label Distribution . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 7.1. Source Label Indication . . . . . . . . . . . . . . . . . 10 7.2. LDP Source Label Capability TLV . . . . . . . . . . . . . 10 7.3. BGP Source Label Capability Attribute . . . . . . . . . . 10 8. Security Considerations . . . . . . . . . . . . . . . . . . . 10 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 11 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 11 10.1. Normative References . . . . . . . . . . . . . . . . . . 11 10.2. Informative References . . . . . . . . . . . . . . . . . 11 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 Chen, et al. Expires January 4, 2015 [Page 2] Internet-Draft Source Label July 2014 1. Problem Statement and Introduction A MultiProtocol Label Switching (MPLS) label [RFC3031] was originally defined for packet forwarding and assumes the forwarding/destination address semantics. As no source identity information is carried in the label stack, there is no way to directly derive the source identity information from the label or label stack. MPLS LSPs can be categorized into four different types: Point-to-Point (P2P) Point-to-Multipoint (P2MP) Multipoint-to-Point (MP2P) Multipoint-to-Multipoint (MP2MP) For P2P and P2MP LSPs (e.g., the Resource Reservation Protocol Traffic Engineering (RSVP-TE) [RFC3209] based and statically configured P2P and P2MP LSPs), the source identity may be implicitly derived by the egress LSR from the label when Penultimate Hop Popping (PHP) is disabled and the correlation between ingress LSR and the LSP is explicitly signaled through the control plane. Such LSP may be characterized as MPLS-TP LSP [RFC5960]. However, for MP2P and MP2MP LSPs (e.g., the Distribution Protocol (LDP) based LSPs [RFC5036] [RFC6388], and Layer 3 Private Network (L3VPN) [RFC4364] LSPs), ingress LSRs of those LSPs cannot be identified by egress LSRs. Comparing to the pure IP forwarding where both source and destination addresses are encoded in the IP packet header, the essential issue of the MPLS encoding is that the label stack does not explicitly include any source identity information. For some applications, source identification is a critical requirement. For example, performance monitoring, the monitoring nodes need to identify where packets were sent from and then can count the packets according to some constraints. This document introduces the concept of Source Label (SL). An SL uniquely identifies a node within an administrative domain, it is carried in the label stack and used to identify the ingress LSR that originated the MPLS frame. Chen, et al. Expires January 4, 2015 [Page 3] Internet-Draft Source Label July 2014 2. Terminology SL - Source Label SLC - Source Label Capability SLI - Source Label Indicator SLAD - Source Label Administrative Domain 3. Source Label A Source Label is defined to uniquely identify a node that is (one of) the ingress LSR(s) to a specific LSP. In its function as a Source Label, it MUST be unique within a domain. In cases where a Source Label is used across domains it MUST be unique within the scope it is used. In this document, the domain or domains that the Source Label is required to be unique is referred as a "Source Label Administrative Domain" (SLAD). To prevent the Source Label from leaking to unintended domains, two aspects need to be considered: In control plane, it SHOULD make sure that the Source Label will not be distributed outside the SLAD where it is used. And since the ingress LSR is based on the Source Label Capability signaled by the egress LSR to determine whether to insert the Source Label, the SLC signaling SHOULD make sure that the SLC will not be signaled to the LSRs that reside in other SLADs. In data plane, the domain boundary nodes (e.g., the ASBR) SHOULD have the capability to filter out the packets that carry the SL/ SLI and are received from other SLADs. For example, some policies (e.g., by ACL) could be deployed at the ASBR to filter out the packets that carry SLI and are from other SLADs. The Source Labels are allocated from a dedicated label space that is completely different from the space of the normal forwarding labels. Configuration system (e.g., static configuration or NMS) is one way to make sure the uniqueness of each SL assigned to specific LSR. There may be some other potential dynamic solutions that can be used for SL allocation and distribution. This is left for future study. For most of the cases, one Source Label per LSR is enough. But for some cases, there may need more than one Source Labels. For example, in the L3VPN scenario, it may require to allocate dedicated Source Label to identify each VPN instance. This requires that the Source Chen, et al. Expires January 4, 2015 [Page 4] Internet-Draft Source Label July 2014 Label distribution protocol MUST have the capability to process this "one or more Source Labels per LSR" situation. In order to indicate whether a label is a Source Label, a Source Label Indicator (SLI) is introduced. The SLI is a special purpose label [RFC7274] that is placed immediately before the source label in the label stack, which is used to indicate that the next label in the label stack is the Source Label. Throughout the document mention to a Source Label refers to the combination of SLI and SL. The value of SLI is TBD1. 4. Use Cases This section outlines the use cases which benefit from application of Source Label. 4.1. Performance Measurement There are two general types of performance measurement: one is active performance measurement, and the other is passive performance measurement. In active performance measurement the receiver measures the injected packets to evaluate the performance of a path. The active measurement measures the performance of the extra injected packets. The IP Performance Metrics (IPPM) working group has defined specifications [RFC4656][RFC5357] for the active performance measurement. In passive performance measurement, no additional traffic is injected into the flow and measurements are taken to record the performance metrics of the data traffic. The MPLS performance measurement protocol [RFC6374] for packet loss is an example of passive performance measurement, but it can only apply to MPLS-TE LSPs. For a specific receiver, in order to count the received packets of a flow, it has to know whether a received packet belongs to which target flow under test and the source identification is a critical condition. As discussed in the previous section, the existing MPLS label or label stack do not carry the source information. So, for an LSP, the ingress LSR can put its Source Label in the label stack, and then the egress LSR can use the Source Label for packets identification of frame's source and accounting. Chen, et al. Expires January 4, 2015 [Page 5] Internet-Draft Source Label July 2014 5. Data Plane Processing 5.1. Ingress LSR For an LSP, the ingress LSR MUST make sure that the egress LSR is able to process the Source Label before inserting the SLI/SL combination into the label stack. Therefore, an egress LSR SHOULD signal (see Section 6.1) to the ingress LSR whether it is able to process the Source Label. Once the ingress LSR knows that the egress LSR can process Source Label, it can choose whether or not to insert the SL and SLI into the label stack. When an SL to be included in a label stack, the steps are as follows: 1. Push the SL, the TTL of the SL MUST be set to 1, the BoS bit for the SL depends on whether the SL is the bottom label. Setting and interpretation of TC field of the SL is for further study; 2. Push the SLI, the TTL and TC fields for the SLI MUST be set to the same values as for the LSP Label (L); 3. Push the LSP Label (L). Then the label stack looks like: <...L, SLI, SL [,...]>. There MAY be multiple pairs of SLI and SL inserted into the label stack, each pair is related to an LSP. For the given LSP, only one pair of SLI and SL MUST be inserted. 5.2. Transit LSR There is no change in forwarding behavior for transit LSRs. If a transit LSR can recognize the SLI, it can use the SL to collect traffic throughput and/or measure the performance of the LSP. 5.3. Egress LSR When an egress LSR receives a packet with a SLI/SL combination, if the egress LSR is able to process the SL; it pops the LSP label (if any), SLI and SL; then processes remaining packet header as normal. If the egress LSR is not able to process the SLI, the packet SHOULD be dropped as specified for the handling of any unknown label according to [RFC3031]. 5.4. Penultimate Hop LSR There is no change in forwarding behavior for the penultimate hop LSR. Chen, et al. Expires January 4, 2015 [Page 6] Internet-Draft Source Label July 2014 6. Source Label Signaling Source label signaling includes two aspects: one is source label capability signaling, the other is source label distribution. 6.1. Source Label Capability Signaling Before inserting a Source Label in the label stack, an ingress LSR SHOULD know whether the egress LSR is able to process the Source Label. Therefore, an egress LSR SHOULD signal to the ingress LSRs its ability to process the Source Label. This is called Source Label Capability (SLC), it is very similar to the "Entropy Label Capability (ELC)"[RFC6790]. 6.1.1. LDP Extensions A new LDP TLV [RFC5036], SLC TLV, is defined to signal an egress's ability to process Source Label. The SLC TLV MAY appear as an Optional Parameter of the Label Mapping Message. The presence of the SLC TLV in a Label Mapping Message indicates to ingress LSRs that the egress LSR can process Source Labels for the associated LSP. The structure of the SLC TLV is shown below. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|F| Type (TBD2) | Length (0) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: Source Label Capability TLV This U bit MUST be set to 1. If the SLC TLV is not understood by the receiver, then it MUST be ignored. This F bit MUST be set to 1. Since the SLC TLV is going to be propagated hop-by-hop, it should be forwarded even by nodes that may not understand it. Type: TBD2. Length field: This field specifies the total length in octets of the SLC TLV and is defined to be 0. An LSR that receives a Label Mapping with the SLC TLV but does not understand it MUST propagate it intact to its neighbors and MUST NOT send a notification to the sender (following the meaning of the U- and F-bits). If the LSR has no other neighbors and does not Chen, et al. Expires January 4, 2015 [Page 7] Internet-Draft Source Label July 2014 understand the SLC TLV, means it is the ingress LSR, it could just ignore it. An LSR X may receive multiple Label Mappings for a given FEC F from its neighbors. In its turn, X may advertise a Label Mapping for F to its neighbors. If X understands the SLC TLV, and if any of the advertisements it received for FEC F does not include the SLC TLV, X MUST NOT include the SLC TLV in its own advertisements of F. If all the advertised Mappings for F include the SLC TLV, then X MUST advertise its Mapping for F with the SLC TLV. If any of X's neighbors resends its Mapping, sends a new Mapping or sends a Label Withdraw for a previously advertised Mapping for F, X MUST re- evaluate the status of SLC for FEC F, and, if there is a change, X MUST re-advertise its Mapping for F with the updated status of SLC. LDP is normally running within an AS, technically, it can be deployed across ASes. An implementation supports the SLC MUST support a per- session/per-interface configuration item to enable/disable the SLC. For the session/interface that connects to other SLADs, the SLC MUST be disabled. 6.1.2. BGP Extensions When Border Gateway Protocol (BGP) [RFC4271] is used for distributing Network Layer Reachability Information (NLRI) as described in, for example, [RFC3107], [RFC4364], the BGP UPDATE message may include the SLC attribute as part of the Path Attributes. This is an optional, non-transitive BGP attribute of value TBD3. The inclusion of this attribute with an NLRI indicates that the advertising BGP router can process Source Labels as an egress LSR for all routes in that NLRI. A BGP speaker S that originates an UPDATE should include the SLC attribute only if both of the following are true: A1: S sets the BGP NEXT_HOP attribute to itself AND A2: S can process source labels. Suppose a BGP speaker T receives an UPDATE U with the SLC attribute. T has two choices. T can simply re-advertise U with the SLC attribute if either of the following is true: B1: T does not change the NEXT_HOP attribute OR B2: T simply swaps labels without popping the entire label stack and processing the payload below. An example of the use of B1 is Route Reflectors. However, if T changes the NEXT_HOP attribute for U and in the data plane pops the Chen, et al. Expires January 4, 2015 [Page 8] Internet-Draft Source Label July 2014 entire label stack to process the payload, T MAY include an SLC attribute for UPDATE U' if both of the following are true: C1: T sets the NEXT_HOP attribute of U' to itself AND C2: T can process source labels. Otherwise, T MUST remove the SLC attribute. 6.1.2.1. Sending/Receiving Restriction An implementation that supports the SLC MUST support per-session configuration item, SL_SESSION, that indicates whether the SLC is enabled or disabled for use on that session. - The default value of SL_SESSION, for EBGP sessions, MUST be "disabled". - The default value of SL_SESSION, for IBGP and confederation-EBGP [RFC5065]sessions, SHOULD be "enabled." The SLC attribute MUST NOT be sent on any BGP session for which SL_SESSION is disabled. If an SLC attribute is received on a BGP session for which SL_SESSION is disabled, the attribute MUST be treated exactly as if it were an unrecognized non-transitive attribute. That is, "it MUST be quietly ignored and not passed along to other BGP peers" (see [RFC4271], section 5). 6.1.3. IGP Extensions No dedicated SLC signaling defined in this document, as defined in [I-D.chen-isis-source-label-distribution] and [I-D.chen-ospf-source-label-distribution], the presence of a Source Label TLV MUST be interpreted as support of SLC by the LSR. That means the SLC is implicitly indicated by receiving a SL distribution from an LSR. 6.2. Source Label Distribution Based on the Source Label, an egress or intermediate LSR can identify from where an MPLS packet is sent. To achieve this, the egress and/ or intermediate LSRs have to know which ingress LSR is related to which Source Label before using the Source Label to derive the source information. Therefore, there needs to be a mechanism to distribute the mapping information between an ingress LSR and its Source Label. Chen, et al. Expires January 4, 2015 [Page 9] Internet-Draft Source Label July 2014 IGP based Source Label distributions are defined in [I-D.chen-isis-source-label-distribution] [I-D.chen-ospf-source-label-distribution], which apply to the intra- AS scenario. For inter-AS scenario, BGP extension is a naturally choice and can be used to convey SL mapping information from one AS to other ASes. The BGP extension draft is work in progress. For BGP based SL distribution, it requires that SLs MUST not be sent out of a SLAD. The similar sending and receiving restriction as defined in Section 6.1.3 is also needed. 7. IANA Considerations 7.1. Source Label Indication IANA is required to allocate a special purpose label (TBD1) for the Source Label Indicator (SLI) from the "Multiprotocol Label Switching Architecture (MPLS) Label Values" Registry. 7.2. LDP Source Label Capability TLV IANA is requested to allocate a value of TBD2 from the IETF Consensus range (0x0001-0x07FF) in the "TLV Type Name Space" registry as the "Source Label Capability TLV". 7.3. BGP Source Label Capability Attribute IANA is requested to allocate a Path Attribute Type Code TBD3 from the "BGP Path Attributes" registry as the "BGP Source Label Capability Attribute". 8. Security Considerations This document introduces the SLAD that is the scope of a SL, SLC and SL MUST NOT be signaled and distributed outside one SLAD. The SLC and SL distribution is controlled by SL_SESSION configuration, improper configuration on both ends of an EBGP connection could result in the SLC and SL being passed from one SLAD to another. This would likely result in potential SL conflicts. To prevent packets carrying SL/SLI from leaking from one SLAD to another, the SLAD boundary nodes SHOULD deploy some policies (e.g., ACL) to filter out the packets. Specifically, in the sending end, the SLAD boundary node SHOULD filter out the packets that carry the SLI and are sent to other SLADs; in the receiving end, the SLAD boundary node SHOULD drop the packets that carry the SLI and are from other SLADs. Chen, et al. Expires January 4, 2015 [Page 10] Internet-Draft Source Label July 2014 9. Acknowledgements The process of "Source Label Capability Signaling" is largely referred to the process of "ELC signaling"[RFC6790]. The authors would like to thank Carlos Pignataro, Loa Andersson , Curtis Villamizar, Eric Osborne, Eric Rosen, Yimin Shen, Lizhong Jin and Yakov Rekhter for their review, suggestion and comments to this document. 10. References 10.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC3031] Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol Label Switching Architecture", RFC 3031, January 2001. [RFC3107] Rekhter, Y. and E. Rosen, "Carrying Label Information in BGP-4", RFC 3107, May 2001. [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V., and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP Tunnels", RFC 3209, December 2001. [RFC5036] Andersson, L., Minei, I., and B. Thomas, "LDP Specification", RFC 5036, October 2007. [RFC5420] Farrel, A., Papadimitriou, D., Vasseur, JP., and A. Ayyangarps, "Encoding of Attributes for MPLS LSP Establishment Using Resource Reservation Protocol Traffic Engineering (RSVP-TE)", RFC 5420, February 2009. [RFC6374] Frost, D. and S. Bryant, "Packet Loss and Delay Measurement for MPLS Networks", RFC 6374, September 2011. [RFC7274] Kompella, K., Andersson, L., and A. Farrel, "Allocating and Retiring Special-Purpose MPLS Labels", RFC 7274, June 2014. 10.2. Informative References [I-D.chen-isis-source-label-distribution] Chen, M. and G. Mirsky, "Extensions to ISIS for Source Label Distribution", draft-chen-isis-source-label- distribution-00 (work in progress), February 2014. Chen, et al. Expires January 4, 2015 [Page 11] Internet-Draft Source Label July 2014 [I-D.chen-ospf-source-label-distribution] Chen, M. and G. Mirsky, "Extensions to OSPF for Source Label Distribution", draft-chen-ospf-source-label- distribution-00 (work in progress), February 2014. [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, May 2000. [RFC4271] Rekhter, Y., Li, T., and S. Hares, "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, January 2006. [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private Networks (VPNs)", RFC 4364, February 2006. [RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. Zekauskas, "A One-way Active Measurement Protocol (OWAMP)", RFC 4656, September 2006. [RFC4761] Kompella, K. and Y. Rekhter, "Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling", RFC 4761, January 2007. [RFC5065] Traina, P., McPherson, D., and J. Scudder, "Autonomous System Confederations for BGP", RFC 5065, August 2007. [RFC5357] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and J. Babiarz, "A Two-Way Active Measurement Protocol (TWAMP)", RFC 5357, October 2008. [RFC5960] Frost, D., Bryant, S., and M. Bocci, "MPLS Transport Profile Data Plane Architecture", RFC 5960, August 2010. [RFC6388] Wijnands, IJ., Minei, I., Kompella, K., and B. Thomas, "Label Distribution Protocol Extensions for Point-to- Multipoint and Multipoint-to-Multipoint Label Switched Paths", RFC 6388, November 2011. [RFC6790] Kompella, K., Drake, J., Amante, S., Henderickx, W., and L. Yong, "The Use of Entropy Labels in MPLS Forwarding", RFC 6790, November 2012. Authors' Addresses Mach(Guoyi) Chen Huawei Email: mach.chen@huawei.com Chen, et al. Expires January 4, 2015 [Page 12] Internet-Draft Source Label July 2014 Xiaohu Xu Huawei Email: xuxiaohu@huawei.com Zhenbin Li Huawei Email: lizhenbin@huawei.com Luyuan Fang Microsoft Email: lufang@microsoft.com Greg Mirsky Ericsson Email: Gregory.mirsky@ericsson.com Chen, et al. Expires January 4, 2015 [Page 13]