Internet DRAFT - draft-eastlake-trill-channel-tunnel
draft-eastlake-trill-channel-tunnel
INTERNET-DRAFT Donald Eastlake
Updates: RFCchannel Yizhou Li
Intended status: Proposed Standard Huawei
Expires: April 20, 2014 October 21, 2013
TRILL: RBridge Channel Tunnel Protocol
<draft-eastlake-trill-channel-tunnel-00.txt>
Abstract
The IETF TRILL (Transparent Interconnection of Lots of Links)
protocol includes an optional mechanism, called RBridge Channel, for
the transmission of typed messages between TRILL switches in the same
campus and between TRILL switches and end stations on the same link.
This document specifies optional extensions to RBridge Channel that
provides three facilities: (1) A mechanism to send such messages
between a TRILL switch and an end station in either direction, or
between two end stations, when the two devices are in the same campus
but not on the same link; (2) A method to support security facilities
for RBridge Channel messages; and (3) A method to tunnel a variety of
payload types by encapsulating them in an RBridge Channel message.
Status of This Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Distribution of this document is unlimited. Comments should be sent
to the authors or the TRILL working group mailing list:
trill@ietf.org
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html. The list of Internet-Draft
Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
D. Eastlake & Y. Li [Page 1]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Table of Contents
1. Introduction............................................3
1.2. Terminology and Acronyms.............................3
2. Channel Tunnel Packet Format............................5
3. Tunnel Payload Types....................................8
3.1 Null Payload...........................................8
3.2 RBridge Channel Message Payload........................8
3.3 TRILL Data Packet......................................9
3.4 TRILL IS-IS Packet....................................10
3.5 Ethernet Frame........................................11
3. Channel Tunnel Scopes..................................13
3.1 End Station to RBridge(s).............................14
4.2 RBridge to End Station................................15
4.3 End Station to End Station............................16
5. Security, Keying, and Algorithms.......................18
5.1 SType None............................................18
5.2 RFC 5310 Based Authentication.........................18
5.3 DTLS Based Security...................................19
6. Channel Tunnel Errors..................................20
6.1 SubERRs under ERR 6...................................20
7. IANA Considerations....................................21
8. Security Considerations................................21
Normative References......................................22
Informative References....................................22
Acknowledgements..........................................23
Authors' Addresses........................................24
D. Eastlake & Y. Li [Page 2]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
1. Introduction
The IETF TRILL protocol [RFC6325] provides efficient least cost
transparent frame routing in multi-hop networks with arbitrary
topologies and link technologies, using link-state routing and a
header with a hop count. End stations are attached to TRILL switches
by Ethernet but links between TRILL switches can be arbitrary
technology. In general, the TRILL way to address or specify a TRILL
switch (RBridge) in a TRILL campus is by the switch's TRILL provided
nickname [RFC6325] [ClearCorrect].
The TRILL protocol includes an optional RBridge Channel facility
[RFCchannel] to support typed message transmission between two
RBridges (for example BFD [RFCbfd]) in the same campus and between
RBridges and end stations on the same link.
This document specifies optional extensions to RBridge Channel that
provides three facilities:
(1) A mechanism to send RBridge Channel messages between a TRILL
switch and an end station in either direction, or between two
end stations, when the two devices are in the same campus but
not on the same link. This mechanism requires the cooperation
of an RBridge that is on the same link as the end station or
stations involved.
(2) A method to support security facilities for RBridge Channel
messages.
(3) A method to tunnel a variety of payload types by encapsulating
them in an RBridge Channel message.
Any one, two, or all three of these facilities can be use in the same
message.
There is no mechanism to stop end stations on the same link, from
sending native RBridge Channel messages to each other; however, such
use is outside the scope of this document.
1.2. Terminology and Acronyms
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
This document uses the acronyms defined in [RFC6325] and [RFCchannel]
supplemented by the following additional acronym:
D. Eastlake & Y. Li [Page 3]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Data Label - VLAN or Fine Grained Label [RFCfgl].
Primary Nickname - If a TRILL switch holds two or more nicknames,
the one it holds with the highest priority is the primary
nickname. If two or more are held with the same priority, the
one with the lowest value, considered as a 16-bit unsigned
integer in network byte order, is the primary nickname.
TRILL switch - An alternative term for an RBridge.
D. Eastlake & Y. Li [Page 4]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
2. Channel Tunnel Packet Format
The general structure of an RBridge Channel message on a link between
TRILL switches (RBridges) is shown in Figure 1 below. When a native
RBridge Channel message is sent between an RBridge and an end station
on the same link, in either direction, the TRILL Header (including
the inner Ethernet addresses and Data Label) is omitted as shown in
Figure 2. The type of RBridge Channel message is given by a Protocol
field in the RBridge Channel Header which indicates how to interpret
the Channel Protocol Specific Payload [RFCchannel].
+-----------------------------------+
| Link Header |
+-----------------------------------+
| TRILL Header |
+-----------------------------------+
| Inner Ethernet Addresses |
+-----------------------------------+
| Data Label (VLAN or FGL) |
+-----------------------------------+
| RBridge Channel Header |
+-----------------------------------+
| Channel Protocol Specific Payload |
+-----------------------------------+
| Link Trailer (FCS if Ethernet) |
+-----------------------------------+
Figure 1. RBridge Channel Packet Structure
+-----------------------------------+
| Ethernet Link Header |
+-----------------------------------+
| RBridge Channel Header |
+-----------------------------------+
| Channel Protocol Specific Payload |
+-----------------------------------+
| FCS |
+-----------------------------------+
Figure 2. Native RBridge Channel Frame
The RBridge Channel Header looks like this:
D. Eastlake & Y. Li [Page 5]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x8946 | CHV | Channel Protocol |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Channel Protocol Specific Data
|
Figure 3. RBridge Channel Header
where 0x8946 is the RBridge Channel Ethertype and CHV is the Channel
Header Version, currently zero.
The extensions specified herein are in the form of an RBridge Channel
protocol, the Channel Tunnel Protocol. Figure 4 below expands the
RBridge Channel Header and Protocol Specific Payload above for the
case of the Channel Tunnel Protocol.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
RBridge Channel Header:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x8946 | 0x0 | Tunnel Protocol(0x00?)|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Channel Tunnel Protocol Specific: | SubERR| Scope | SType | PType |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Scope Information, variable length (0 length if Scope=0)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Security information, variable length (0 length if SType = 0)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Tunneled Data, variable length
| ...
Figure 4. Channel Tunnel Header Structure
The RBridge Channel Header field specific to the RBridge Channel
Tunnel Protocol is the Protocol field. Its contents MUST be the value
allocated for this purpose (see Section 7).
The RBridge Tunnel Channel Protocol Specific fields are as follows:
SubERR: This field provides further details when a Tunnel Channel
error is indicated in the RBridge Channel ERR field. If ERR is
zero, then SubERR MUST be sent as zero and ignored on receipt.
See Section 6.
D. Eastlake & Y. Li [Page 6]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Scope: This field describes the transport scope of the instance of
Channel Tunnel. See Section 4.
SType: This field describes the type of security information and
features, including keying material, being provided. See
Section 5.
PType: Payload type. The describes the tunneled data. See Section
3 below.
The Channel Tunnel protocol is integrated with the RBridge Channel
facility. Channel Tunnel errors are reported as if they were RBridge
Channel errors, using newly allocated code points in the ERR field of
the RBridge Channel Header supplemented by the SubErr field.
Additional RBridge Channel Header flags are specified and used by
Channel Tunnel.
D. Eastlake & Y. Li [Page 7]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
3. Tunnel Payload Types
The RBridge Channel Tunnel Protocol can carry a variety of payloads
as indicated by the PType field. Value are shown in the table below
with further explanation after the table.
PType Section Description
----- ------- -----------
0 Reserved
1 3.1 Null
2 3.2 RBridge Channel message
3 3.3 TRILL Data packet
4 3.4 TRILL IS-IS packet
5 3.5 Ethernet Frame
6-14 (Available for assignment by IETF Review)
15 Reserved
Table 1. Payload Type Values
While implementation of the Channel Tunnel protocol is optional, if
it is implemented PTypes 1 (Null) and 2 (RBridge Channel message)
MUST be implemented. PTypes 3, 4, and 5 MAY be implemented. The
processing of any particular Channel Protocol message and its payload
depends on meeting local security and other policy at the destination
TRILL switch or end station.
3.1 Null Payload
The Null payload type is intended to be used for messages such as key
negotiation or the like. It indicates that there is no payload. Any
data after the possible Scope Information and Security Information
fields is ignored.
3.2 RBridge Channel Message Payload
A PType of 2 indicates that the payload of the Channel Tunnel message
is an encapsulated RBridge Channel message without the initial
RBridge Channel Ethertype. Typical reasons for sending an RBridge
Channel message inside a Channel Tunnel message are to provide
security services, such as authentication or encryption, or to
forward it through a cooperating border TRILL switch in either
direction between an end station and a TRILL switch not on the same
link.
This looks like the following:
D. Eastlake & Y. Li [Page 8]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | 0x0 | Tunnel Protocol(tbd) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| Scope | SType | 0x2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Possible Scope Information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Possible Security information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x0 | Channel Protocol | Flags | ERR |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Channel Protocol Specific Data ... |
|
Figure 5. Tunneled Channel Message Channel Tunnel Structure
3.3 TRILL Data Packet
A PType of 3 indicates that the payload of the Tunnel protocol
message is an encapsulated TRILL Data packet without the initial
TRILL Ethertype as shown in the figure below. If this PType is
implemented, the tunneled TRILL Data packet is handled as if it had
been received by the destination TRILL switch on the port where the
Channel Tunnel message was received.
D. Eastlake & Y. Li [Page 9]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | 0x0 | Tunnel Protocol(tbd) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| Scope | SType | 0x3 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Possible Scope Information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Possible Security information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| V | R |M|Op-Length| Hop Count | Egress Nickname |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ingress Nickname | Inner.MacDA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacDA continued |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacSA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacSA (cont.) | Inner Data Label ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| TRILL Data Packet payload
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 6. Nested TRILL Data Packet Channel Tunnel Structure
3.4 TRILL IS-IS Packet
A PType of 4 indicates that the payload of the Tunnel protocol
message is an encapsulated TRILL IS-IS packet without the initial
L2-IS-IS Ethertype as shown in the figure below. If this PType is
implemented, the tunneled TRILL IS-IS packet is processed by the
destination RBridge if it meets local policy. The intended use is to
expedite the receipt of a link state PDU by some TRILL switch with an
immediate requirement for the enclosed link state data. It is
RECOMMENDED that any link local IS-IS PDU (Hello, xSNP, MTU-x)
received via this channel tunnel payload type be discarded.
D. Eastlake & Y. Li [Page 10]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | 0x0 | Tunnel Protocol(tbd) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR|| Scope | SType | 0x4
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Possible Scope Information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Possible Security information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| 0x83 | rest of IS-IS PDU
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 7. Tunneled TRILL IS-IS Packet Structure
3.5 Ethernet Frame
If PType is 5, the Tunnel Protocol payload is an Ethernet frame as
might be received from or sent to an end station except that the
tunneled Ethernet frame's FCS is omitted, as shown in Figure 8.
(There is still an overall FCS if the RBridge Channel message is
being sent on an Ethernet link.) If this PType is implemented, the
tunneled frame is handled as if it had been received on the port on
which the Tunnel Protocol message was received.
In the case of a non-Ethernet link, such as a PPP link [RFC6361], the
ports on the link are considered to have link local synthetic 48-bit
MAC addresses constructed by concatenating three 16-bit quantities:
0xFEFF, the primary nickname of the TRILL switch (see Section 1.2),
and the Port ID that the RBridge has assigned to that port, as shown
in Figure 9. The resulting MAC address has the Local bit on and the
Group bit off [RFC5342bis]. Since end stations are connected to TRILL
switches only over Ethernet, there can be no end stations on a non-
Ethernet link in a TRILL campus. Thus such synthetic MAC addresses
cannot conflict on the link with an end station address.
D. Eastlake & Y. Li [Page 11]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RBridge-Channel (0x8946) | 0x0 | Tunnel Protocol(tbd) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags | ERR | SubERR| Scope | SType | 0x5 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Possible Scope Information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
| Possible Security information
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacDA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacDA (cont.) | MacSA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Inner.MacSA |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MacSA (cont.) | Any Ethernet frame tagging...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
| Ethernet frame payload
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 8. Ethernet Frame Channel Tunnel Structure
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0xFEFF | Primary Nickname |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Port ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 9. Synthetic MAC Address
D. Eastlake & Y. Li [Page 12]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
3. Channel Tunnel Scopes
The Channel Tunnel protocol extends the RBridge Channel facility to
optionally support typed messages between an end station and a TRILL
switch, in either direction, or between two end stations, when these
devices are part of the same TRILL campus but not on the same link.
The scopes specified in this document are as follows:
Scope Symbol Section From-To
----- ------ ------- -------
0 NORM Normal
1 ESRB 3.1 End Station to RBridge
2 RBES 3.2 RBridge to End Station
3 ESES 3.3 End Station to End Station
4-14 Available for assignment by IETF Review
15 Reserved
Table 2. Scope Values
If the Channel Tunnel protocol is supported, then the NORM scope MUST
be supported. All other scopes MAY be supported. In cases where a
sequence of steps is given, other processing sequences producing the
same result are, as always, allowed. The detail are given below.
NORM: This is the normal scope of an RBridge Channel message. The
base RBridge Channel mechanisms apply [RFCchannel]. The scope
dependent addressing information is of zero length. This scope is
typically used when just the security or payload type features of
the Tunnel Protocol are desired. If a TRILL switch supports the
Channel Tunnel facility, it MUST support NORM scope.
ESRB: From end station to RBridge(s) not on the same link. The scope
dependent address information is eight bytes long. See Section 4.1
for further details. This scope MAY be supported.
RBES: From RBridge to end station not on the same link. The scope
dependent address information is eight bytes long. See Section 4.2
for further details. This scope MAY be supported.
ESES: From end station to en station not on the same link. The scope
information is twelve bytes long. See Section 4.3 for further
details. This scope MAY be supported.
It is an implementation option and may depend on local policy whether
or not an edge TRILL switch that has been requested to forward a
Channel Tunnel protocol message due to a non-NORM Scope examines the
SType and, if it does examine the SType, whether it verifies any
authentication.
D. Eastlake & Y. Li [Page 13]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
3.1 End Station to RBridge(s)
The ESRB scope additional information is as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Scope Destination Nickname | (2 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
| Scope Source MAC Address | (6 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
Figure 10. ESRB Scope Information
To support the case where an end station originates a multi-
destination RBridge Channel message to all the TRILL switches
advertising interest in a Data Label, the BR (Broadcast) bit is the
RBridge Channel Header Flags field is used (see Section 7).
Steps by the source end station:
If the RBridge Channel message is intended to a single destination
RBridge, the source end station sets the Scope Destination
Nickname to the nickname of that RBridge and ensures that the BR
bit is zero. If the message is intended to be broadcast to the
RBridges indicating interest in a Data Label, the end stations
sets the BR bit, uses that Data Label as part of the TRILL Header
information, and the contents of the Scope Destination Nickname
field is ignored.
Steps by the ingress TRILL switch on receiving the native RBridge
Channel message from the end station:
0. As with any RBridge Channel message, determine, as a matter of
local policy, whether the native RBridge Channel message is
acceptable and discard it if it is not. This test might take
into account, for example, whether the message is authenticated
(see Section 5), whether or not the BR flag is set, and whether
or not the original native destination MAC address is All-Edge-
RBridges.
1. Store the native RBridge Channel message's source MAC address
into the Scope Source MAC Address field.
2. Clear the NA bit and set the MH bit in the RBridge Channel
Header flags.
3. Set the native RBridge Channel message's MAC destination
address to All-Egress-RBridges.
4. Set the native RBridge Channel message's MAC source address to
the MAC address that the ingress RBridge normally uses as the
Inner.MacSA for RBridge Channel messages it originates.
5.a. If the BR flag is zero, ingress the modified native frame as
a unicast TRILL RBridge Channel message with egress nickname
set from the Scope Destination Nickname. If that Scope
D. Eastlake & Y. Li [Page 14]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Destination Nickname is unknown, the appropriate error SHOULD
be returned (see Section 6).
5.b If the BR flag is one, select a distribution tree and ingress
the modified native frame as a multi-destination TRILL RBridge
Channel message.
5.c Regardless of the BR flag value, the Inner.VLAN is the VLAN ID
reported by the ingress port or, if that port is configured for
FGL, the Inner.Lable is the FGL that VLAN maps to.
6. Process the resulting RBridge Channel message. Note that if it
is unicast to the ingress RBridge as egress, it is then
egressed. And if it is multi-destination and the ingress
RBridge qualifies, a copy is egressed as well as a copy being
sent on the selected distribution tree.
4.2 RBridge to End Station
The RBES scope additional addressing information is as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
| Scope Destination MAC Address | (6 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
| Scope Source Nickname | (2 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 11. RBES Scope Information
Steps by the source TRILL switch:
The source RBridge must set the Scope Destination MAC Address
field. It creates an RBridge Channel message, either unicast or
multi-destination, based on that MAC address. (The Inner.MacDA
cannot be used for this because it must be the All-Egress-RBridges
MAC address.) The created RBridge Channel message is unicast if
the Scope Destination MAC address is unicast and the creating
RBridge knows the egress to which that MAC address is connect. The
created RBridge channel message is multi-destination if the Scope
Destination MAC Address is broadcast, multicast, or unknown
unicast. The source RBridge sets the Inner.MacSA to the MAC
address it usually uses for RBridge Channel messages and also
selects the Inner VLAN or FGL.
Steps by the egress TRILL switch(es):
The egress TRILL switch stores the ingress nickname into the Scope
Source Nickname and sets the NA bit in the RBridge Channel Header
flags. It then egresses the frame as a native RBridge Channel
message, setting the native frame's outer destination and source
MAC addresses to the Scope Destination MAC Address and the egress
D. Eastlake & Y. Li [Page 15]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
RBridge port's MAC address, respectively.
If the original RBridge Channel message was multi-destination it
might be egressed by more than one TRILL switch, each of which
would perform the above transform. Whether such a multi-
destination RBridge Channel Tunnel Protocol message would be
accepted by any particular egress TRILL switch is a matter of
local policy.
4.3 End Station to End Station
The ESES scope additional addressing information is as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
| Scope Destination MAC Address | (6 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
| Scope Source MAC Address | (6 bytes)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+
Figure 12. ESES Scope Information
Steps by the source end stations:
If the RBridge Channel message is intended for a single
destination end station, the source end station sets the Scope
Destination MAC address to the MAC address of that end station and
ensures that the BR bit is zero. If the message is intended to be
broadcast to a set of end stations via a multicast MAC address or
the broadcast MAC address, the end station sets the Scope
Destination MAC address to that multicast or broadcast address and
sets the BR bit. All of this is within the VLAN of the native
RBridge Channel message or its Fine Grained Label (FGL) if the
ingress port is configured to map to an FGL.
Steps by the ingress TRILL switch:
0. As with any RBridge Channel message, determine, as a matter of
local policy, whether the native RBridge Channel message is
acceptable and discard it if it is not. This test might take
into account, for example, whether the message is authenticated
(see Section 5), whether or not the BR flag is set, and whether
or not the original Outer.MacDA is All-Edge-RBridges.
1. Store the native RBridge Channel message's source MAC address
into the Scope Source MAC Address.
2. Clear the NA bit and set the MH bit in the RBridge Channel
Header flags.
3. Set the native RBridge Channel message's MAC destination
address to All-Egress-RBridges.
D. Eastlake & Y. Li [Page 16]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
4. Set the native RBridge Channel message's MAC source address to
the MAC address that the ingress RBridge normally uses as the
Inner.MacSA for RBridge Channel messages it originates.
5.a. If the BR flag is zero, lookup the Scope Destination MAC
Address and ingress the modified native frame as if it were a
unicast native frame with that destination MAC address. This
will result in either a unicast TRILL Data packet to the Scope
Destination MAC Address or in unknown MAC flooding.
5.b If the BR flag is one, select a distribution tree and ingress
the modified native frame as a multi-destination TRILL RBridge
Channel message.
5.c Regardless of the BR flag value, the Inner.VLAN is the VLAN ID
reported by the ingress port or, if that port is configured for
FGL, the Inner.Lable is the FGL that VLAN maps to.
6. Process the resulting RBridge Channel message. Note that if it
is unicast to the ingress RBridge as egress, it is then
egressed. And if it is multi-destination and the ingress
RBridge qualifies, a copy is egressed as well as a copy being
sent on the selected distribution tree. It is possible that the
Scope Destination MAC is actually out a different or even the
same port of the ingress TRILL switch as the port on which the
native RBridge Channel message was received.
Steps by the egress TRILL switch(es):
The egress RBridge sets the NA bit in the RBridge Channel Header
flags. It then egresses the frame as a native RBridge Channel
message, setting the native frame's outer destination and source
MAC addresses to the Scope Destination MAC Address and the egress
RBridge port's MAC address, respectively.
If the original RBridge Channel message was multi-destination it
might be egressed by more than one RBridge, each of which would
perform the above transform. Whether such a multi-destination
RBridge Channel Tunnel Protocol message would be accepted by
egress RBridges is a matter of local policy.
D. Eastlake & Y. Li [Page 17]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
5. Security, Keying, and Algorithms
The following table gives the assigned values of the SType field and
their meaning.
SType Section Meaning
----- ------- -------
0 5.1 None
1 5.2 RFC 5310 Based Authentication
2 5.3 DTLS Based Security
3-14 Available for assignment on IETF Review
15 Reserved
Table 3. SType Values
For all SType values except zero, the Security Information starts
with a byte of flag bits and a byte of remaining length as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
|A|E| RESV | Size | Info
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
Figure 12. Security Information Format
The fields are as follows:
A: Zero if authentication is not being provided. One if it is.
E: Zero if encryption is not being provided. One if it is.
RESV: Six reserved bits that MUST be sent as zero and ignored on
receipt.
Size: The number of byte of Info as an unsigned byte.
Info: Variable length Security Information.
5.1 SType None
No security services are being invoked. The length of the Security
Information field (see Figure 6) is zero.
5.2 RFC 5310 Based Authentication
The security information is the same as the value of the
Authentication TLV as specified in [RFC5310]. See figure below.
D. Eastlake & Y. Li [Page 18]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1|0| RESV | Size |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| Authentication Data (Variable)|
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 13. SType 1 Security Information
The Key ID normally specifies a keying value and algorithm.
5.3 DTLS Based Security
TBD - permits key negotiation, provides both encryption and
authentication [RFC6347]...
D. Eastlake & Y. Li [Page 19]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
6. Channel Tunnel Errors
RBridge Channel Tunnel Protocol errors are reported like RBridge
Channel level errors. The ERR field is set to one of the following
error codes:
ERR Meaning
--- ---------
6 Unknown or unsupported field value
7 Authentication failure
(more TBD)
Table 4. Additional ERR Values
6.1 SubERRs under ERR 6
If the ERR field is 6, the SubERR field indicates
SubERR Meaning (for ERR = 6)
------ ---------------------
0 Unsupported Scope
1 Unsupported SType
2 Unsupported PType
3 Unknown or reserved Scope Egress Nickname in an
ESRB scope Tunnel Channel message.
4 Unsupported crypto algorithm
(more TBD)
Table 5. SubERR values under ERR 6
D. Eastlake & Y. Li [Page 20]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
7. IANA Considerations
IANA is requested to allocate a new RBridge Channel protocol number
from the range based on Standards Action for the "Channel Tunnel"
protocol.
IANA is requested to allocate a new RBridge Channel Header flag bit
for the Broadcast (BR) flag with this document as reference.
8. Security Considerations
The RBridge Channel tunnel facility has potentially positive and
negative effects on security.
On the positive side, it provides optional security that can be used
to authenticate and/or encrypt channel messages. Some RBridge Channel
message payloads provide their own security [RFCbfd] but where this
is not true, careful consideration should be give to requiring use of
the security features of the Tunnel Protocol.
On the negative side, the ability to tunnel various payload types and
to tunnel them not just between TRILL switches but to and from end
stations can increase risk unless precautions are taking. The
processing of decapsulated Tunnel Protocol payloads is not a good
place to be liberal in what you accept as the tunneling facility
makes it easier for unexpected messages to pop up in unexpected
places in a TRILL campus due to accidents or the actions of an
adversary. Local policies should generally be strict and only process
payload types required and then only with adequate authentication for
the particular circumstances.
See [RFCchannel] for general RBridge Channel Security Considerations.
See [RFC6325] for general TRILL Security Considerations.
D. Eastlake & Y. Li [Page 21]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Normative References
[RFC2119] - Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5310] - Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic Authentication", RFC
5310, February 2009.
[RFC6325] - Perlman, R., D. Eastlake, D. Dutt, S. Gai, and A.
Ghanwani, "RBridges: Base Protocol Specification", RFC 6325,
July 2011.
[RFC6347] - Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, January 2012.
[ClearCorrect] - Eastlake, D., M. Zhang, A. Ghanwani, V. Manral, A.
Banerjee, "TRILL: Clarifications, Corrections, and Updates",
draft-ietf-trill-clear-correct, in RFC Editor's queue.
[RFCchannel] - D. Eastlake, V. Manral, Y. Li, S. Aldrin, D. Ward,
"TRILL: RBridge Channel Support", draft-ietf-trill-rbridge-
channel-08.txt, in RFC Editor's queue.
[RFCfgl] - D. Eastlake, M. Zhang, P. Agarwal, R Perlman, D. Dutt,
"TRILL: Fine-Grained Labeling", draft-ietf-trill-fine-labeling,
in RFC Editor's queue.
Informative References
[RFC6361] - Carlson, J. and D. Eastlake 3rd, "PPP Transparent
Interconnection of Lots of Links (TRILL) Protocol Control
Protocol", RFC 6361, August 2011
[RFC5342bis] - D. Eastlake, J. Abley, " IANA Considerations and IETF
Protocol and Documentation Usage for IEEE 802 Parameters",
draft-eastlake-rfc5342bis, work in progress.
[RFCbfd] - Manral, V., D. Eastlake, D. Ward, A. Banerjee, "TRILL
(Transparent Interconnetion of Lots of Links): Bidirectional
Forwarding Detection (BFD) Support", draft-ietf-trill-rbridge-
bfd, in RFC Editor's queue.
D. Eastlake & Y. Li [Page 22]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Acknowledgements
The contributions of the following are hereby acknowledged:
TBD
The document was prepared in raw nroff. All macros used were defined
within the source file.
D. Eastlake & Y. Li [Page 23]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Authors' Addresses
Donald E. Eastlake, 3rd
Huawei Technologies
155 Beaver Street
Milford, MA 01757 USA
Phone: +1-508-333-2270
EMail: d3e3e3@gmail.com
Yizhou Li
Huawei Technologies
101 Software Avenue,
Nanjing 210012, China
Phone: +86-25-56622310
Email: liyizhou@huawei.com
D. Eastlake & Y. Li [Page 24]
INTERNET-DRAFT TRILL: RBridge Channel Tunnel
Copyright, Disclaimer, and Additional IPR Provisions
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. The definitive version of
an IETF Document is that published by, or under the auspices of, the
IETF. Versions of IETF Documents that are published by third parties,
including those that are translated into other languages, should not
be considered to be definitive versions of IETF Documents. The
definitive version of these Legal Provisions is that published by, or
under the auspices of, the IETF. Versions of these Legal Provisions
that are published by third parties, including those that are
translated into other languages, should not be considered to be
definitive versions of these Legal Provisions. For the avoidance of
doubt, each Contributor to the IETF Standards Process licenses each
Contribution that he or she makes as part of the IETF Standards
Process to the IETF Trust pursuant to the provisions of RFC 5378. No
language to the contrary, or terms, conditions or rights that differ
from or are inconsistent with the rights and licenses granted under
RFC 5378, shall have any effect and shall be null and void, whether
published or posted by such Contributor, or included with or in such
Contribution.
D. Eastlake & Y. Li [Page 25]