Internet DRAFT - draft-jholland-idr-mcast-source-nexthop-over-amt

draft-jholland-idr-mcast-source-nexthop-over-amt







Inter-Domain Routing                                          J. Holland
Internet-Draft                                 Akamai Technologies, Inc.
Intended status: Standards Track                        December 7, 2017
Expires: June 10, 2018


       MBGP Extensions For Multicast Source Reachability Via AMT
          draft-jholland-idr-mcast-source-nexthop-over-amt-00

Abstract

   This document describes a BGP-based method to communicate source IP
   reverse-path reachability for sources of multicast IP traffic which
   is available via AMT (RFC 7450).  This document defines a new SAFI
   (Subsequent Address Family Identifier) Parameter type for MBGP which
   declares the next hop for RPF (Reverse Path Forwarding) of a source
   IP to be the AMT tunnel discovered via an explicitly provided anycast
   IP address for AMT Relay Discovery.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on June 10, 2018.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of



Holland                   Expires June 10, 2018                 [Page 1]

Internet-Draft      MBGP For Multicast Source Via AMT      December 2017


   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Multicast Source Reachability . . . . . . . . . . . . . . . .   3
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   6.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   4
     6.1.  Normative References  . . . . . . . . . . . . . . . . . .   4
     6.2.  Informative References  . . . . . . . . . . . . . . . . .   5
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   AMT [RFC7450] provides a way to forward multicast traffic from an AMT
   relay in a multicast-capable domain to an AMT gateway in a different
   multicast-capable domain over a unicast-only network.

   AMT also defines a well-known anycast address for relay discovery.
   However, a relay needs to have multicast connectivity sufficient to
   receive traffic from a source in order to forward traffic from that
   source.  In some cases, multicast traffic sources may not have
   multicast connectivity to a relay which can be discovered by a
   gateway using the well-known address.  This issue is described in
   more detail in [I-D.ietf-mboned-interdomain-peering-bcp], sections
   3.3, 3.4, and 3.5.

   A service provider may provide multicast traffic and also provide AMT
   relays that can receive their multicast traffic and forward it to AMT
   gateways, but the AMT gateways in receving networks need a way to
   discover an appropriate AMT relay for the sources of IP multicast
   channels with subscribers in that network.

   This document defines such a mechanism by using BGP with
   Multiprotocol Extensions [RFC4760], with a new NLRI (Network Layer
   Reachability Information), described in Section 3.

   Although it is also possible to provide multicast connectivity
   between domains via a GRE tunnel protected with IPSEC, and although a
   BGP connection between domains is likely to operate over such a
   tunnel, the service provider has more flexibility in load balancing
   and automated distribution of multicast traffic-forwarding
   responsibilities among different forwarders by using AMT instead of
   using the same GRE tunnel that communicates the routing information.




Holland                   Expires June 10, 2018                 [Page 2]

Internet-Draft      MBGP For Multicast Source Via AMT      December 2017


2.  Terminology

   AFI     Address Family Information, as defined in BGP

   AMT     Automatic Multicast Tunneling [RFC7450]

   BGP     Border Gateway Protocol [RFC4271]

   MBGP    Border Gateway Protocol with Multiprotocol Extensions
           [RFC4760]

   MRIB    Multicast Routing Information Base, as defined in PIM
           [RFC7761]

   NLRI    Network Layer Reachability Information, as defined in MBGP

   SAFI    Subsequent Address Family Information, as defined in MBGP

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

3.  Multicast Source Reachability

   This document defines a new NLRI called the "Multicast Source over
   AMT" NLRI.  The Multicast Source over AMT NLRI is carried in BGP
   [RFC4271] using BGP Multiprotocol Extensions [RFC4760] with an
   Address Family Identifier (AFI) of 1 or 2 and a Subsequent AFI (SAFI)
   of TBD1.

   The following is the format of the Multicast Source over AMT NLRI:

                    +---------------------------------+
                    |       Relay-AFI (2 octets)      |
                    +---------------------------------+
                    |   AMT Relay Discovery Address   |
                    +---------------------------------+

   The value of the AFI field in the MP_REACH_NLRI/MP_UNREACH_NLRI
   attribute that carries the Multicast Source over AMT NLRI determines
   whether the source route is IPv4 or IPv6.  The value of the Relay-AFI
   field in the Multicast Source over AMT NLRI indicates whether the
   Relay Discovery Address is IPv4 or IPv6.  (AFI 1 indicates IPv4, AFI
   2 indicates IPv6.)

   The route for the source address MUST NOT be added to any unicast RIB
   (Routing Information Base) as a result of processing this NLRI.  The




Holland                   Expires June 10, 2018                 [Page 3]

Internet-Draft      MBGP For Multicast Source Via AMT      December 2017


   route SHOULD be added to MRIBs (Multicast Routing Information Bases)
   as appropriate according to the BGP peering configuration.

   In order for two BGP speakers to exchange labeled Multicast Source
   over AMT NLRIs, they MUST use a BGP Capabilities Advertisement to
   ensure that they both are capable of properly processing such an
   NLRI.  This is done as specified in [RFC4760] by using capability
   code 1 (multiprotocol BGP) with an AFI of 1 or 2 and a SAFI of TBD1.

4.  IANA Considerations

   IANA has assigned the SAFI Value TBD1 from the SAFI Value registry
   defined in Section 9 of RFC 4760 [RFC4760], to denote the new NLRI
   defined in Section 3 of this document.

   [TO BE REMOVED: During experimental development, the private value
   242 from that registry will be used in our implementation.

   This registration should take place at the following location:
   https://www.iana.org/assignments/safi-namespace/safi-namespace.xhtml

   Value    Description
   -----    -------------------------
   TBD1     Multicast Source over AMT

   ]

5.  Security Considerations

   The behavior defined in this document will cause an AMT Gateway to
   open new tunnels to IP addresses specified by an external AS.  As
   such, this has the same security considerations as section 6.2 and
   section 6.3 of [RFC7450], in addition to the usual security
   implications of running the underlying BGP, as described in [RFC4271]
   and [RFC4272].

   It is RECOMMENDED that implementations provide a configurable limit
   on the number of unique AMT Relay Discovery IPs.

6.  References

6.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.




Holland                   Expires June 10, 2018                 [Page 4]

Internet-Draft      MBGP For Multicast Source Via AMT      December 2017


   [RFC4271]  Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
              Border Gateway Protocol 4 (BGP-4)", RFC 4271,
              DOI 10.17487/RFC4271, January 2006,
              <https://www.rfc-editor.org/info/rfc4271>.

   [RFC4760]  Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
              "Multiprotocol Extensions for BGP-4", RFC 4760,
              DOI 10.17487/RFC4760, January 2007,
              <https://www.rfc-editor.org/info/rfc4760>.

   [RFC7450]  Bumgardner, G., "Automatic Multicast Tunneling", RFC 7450,
              DOI 10.17487/RFC7450, February 2015,
              <https://www.rfc-editor.org/info/rfc7450>.

6.2.  Informative References

   [I-D.ietf-mboned-interdomain-peering-bcp]
              Tarapore, P., Sayko, R., Shepherd, G., Eckert, T., and R.
              Krishnan, "Use of Multicast Across Inter-Domain Peering
              Points", draft-ietf-mboned-interdomain-peering-bcp-14
              (work in progress), October 2017.

   [RFC4272]  Murphy, S., "BGP Security Vulnerabilities Analysis",
              RFC 4272, DOI 10.17487/RFC4272, January 2006,
              <https://www.rfc-editor.org/info/rfc4272>.

   [RFC7761]  Fenner, B., Handley, M., Holbrook, H., Kouvelas, I.,
              Parekh, R., Zhang, Z., and L. Zheng, "Protocol Independent
              Multicast - Sparse Mode (PIM-SM): Protocol Specification
              (Revised)", STD 83, RFC 7761, DOI 10.17487/RFC7761, March
              2016, <https://www.rfc-editor.org/info/rfc7761>.

Author's Address

   Jacob Holland
   Akamai Technologies, Inc.
   150 Broadway
   Cambridge, Massachusetts  02142
   USA

   Phone: +1 617 444 3000
   Email: jholland@akamai.com
   URI:   https://www.akamai.com/








Holland                   Expires June 10, 2018                 [Page 5]