MPLS-TP CV Advertisement in PW VCCV draft-mirsky-mpls-tp-cv ...

MPLS-TP CV Advertisement in PW VCCV draft-mirsky-mpls-tp-cv ...

Extended BFD draft-mirmin-bfd-extended Greg Mirsky Xiao Min IETF-105 July 2019, Montreal Motivation Observed proposals to monitor: quality of a BFD session; performance; path MTU Extend BFD beyond continuity checking/connectivity verification to: ensure backward compatibility; Extensibility Intermittent authentication for a BFD session Extended BFD Control Message Format BFD Control Message Guard Word

TLVs BFD Control Message as defined in RFC 5880 Guard Word unique four octets long word to identify Sender and Responder TLVs optional Use Length field in UDP header to detect if a BFD packet includes a TLV, i.e, is an Extended BFD packet Capability Negotiation No Extended BFD by default Capability negotiation using the Poll sequence and the Capability TLV 0

1 2 3 01234567890123456789012345678901 L D M A Reserved L Loss measurement, bit flags Periodic and Poll D Delay measurement, bit flags Periodic and Poll M Path MTU discovery/monitoring A Lightweight Authentication, variable length field If LM or DM are proposed in the Periodic mode, e.g., Asynchronous, the standard

timer negotiation procedures, as defined in RFC 5880, may be used by the remote BFD system Authentication Capability 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Len | AuthL | Authentication Mode ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Len (Length) - four-bits long field. The value of the Length field is equal to the length of the Authentication field, including the Length, in octets. AuthL (Authentication Length) four bits size field. The value of the field is, in four octets long words, the longest authentication signature the BFD system is capable

of supporting for any of the methods advertised in the Authentication Mode field. Authentication Mode - variable-length field. It is a bit-coded field that a BFD system uses to list modes of lightweight authentication it supports. +--------------+-------+------------------------+---------------+ | Bit Position | Value | Description | Reference | +--------------+-------+------------------------+---------------+ | 0 | 0x1 | Keyed SHA-1 | This document | | 1 | 0x2 | Meticulous Keyed SHA-1 | This document | | 2 | 0x4 | SHA-256 | This document | +--------------+-------+------------------------+---------------+

Lightweight Authentication Lightweight Authentication is on-demand authentication of a BFD session using the Poll sequence mechanism Sender Node Responder Node Send Extended BFD control packet with Capability TLV with Poll flag set. Negotiation Phase Authentication Phase Receive Extended BFD control packet with Capability TLV with Final flag set . Send Extended BFD control packet with Lightweight Authentication TLV . Poll flag MUST be set.

Receive Extended BFD control packet with Final flag set and Lightweight Authentication TLV Lightweight Authentication Type = Lightweight Authentication Length HMAC = Variable number of four octets-long words Type - allocated by IANA Length - two octets long field equals length on the HMAC (Hashed Message Authentication Code) field in octets. The value of the Length field MUST be a multiple of 4. HMAC (Hashed Message Authentication Code) - the hash value calculated on the preceding Extended BFD control packet data. +-------+------------------------------------+---------------+ | Value | Description | Reference | +-------+-------------------------------------+---------------+ | 0 |

None | This document | | 1 | One or more TLVs was not understood | This document | | 2 | Lightweight Authentication failed | This document | +-------+-------------------------------------+---------------+ Next Steps Continue adding details (PMTU Monitoring operation) Discuss, discuss, discuss Welcome comments, suggestions, and cooperation WG adoption?

Recently Viewed Presentations

  • Slayt 1 - jotform.com

    Slayt 1 - jotform.com

    Mere Conduits - narrow definition and only apply to courier services such as the Postal Service or Internet Service Provider. Requirements of a Business Associate Agreement. Describe the permitted and required uses of protected health information by the business associate.
  • Quiz on Reflection of Light

    Quiz on Reflection of Light

    laterally inverted. The image formed by a periscope is erect. 8. Which cause the phenomenon in which swimming pool looks shallower than the actual depth? Reflection of Light. Refraction of Light. Total Internal Reflection. Dispersion of Light. 9. When we...
  • Internship in Akita

    Internship in Akita

    Helped RCOS office (Research and Community Outreach Services) organize events for AIU Students. Included rice planting events, traditional festivals, elementary school visits, and more! Provided tours for guests, including young Japanese students or locals interested in AIU.
  • 科學文化和科學新聞寫作 - 國立臺灣大學

    科學文化和科學新聞寫作 - 國立臺灣大學

    第2單元:第二講:近代科學革命如何在歐洲發生 近代科學革命 是如何在歐洲發生的 【本著作除另有註明外,採取創用cc「姓名標示-非商業性-相同方式分享」台灣2.5版授權釋出】
  • University Contracting - University of Arizona

    University Contracting - University of Arizona

    For Sales & Service projects, send the completed transmittal memo and UBIT Questionnaire along with any other information (scope of work, agreement, etc.) to the ORCA general email address. Contact the ORCA general email to gain a blank UBIT Questionnaire...
  • Computer Virus - University of Nebraska-Lincoln

    Computer Virus - University of Nebraska-Lincoln

    Robert Tappan Morris is now a professor at MIT Worms… Worms - is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that...
  • CSSCI2950-C Lecture 2 - Brown University

    CSSCI2950-C Lecture 2 - Brown University

    Arial MS Pゴシック Calibri Arial Unicode MS Symbol Wingdings Mathematica1 Office Theme 1_Office Theme Microsoft Photo Editor 3.0 Photo CSCI2950-C Lecture 11 Cancer Genomics: Duplications Outline DNA Microarrays Comparative Genomic Hybridization (CGH) CGH Analysis (1) HMM Model for CGH data...
  • Written by Natalie Grady Illustrated by Jessica Giurbino

    Written by Natalie Grady Illustrated by Jessica Giurbino

    Illustrated by Jessica Giurbino and Natalie Grady. Sandy Dune and his parents, Mr. and Mrs. Dune, are getting ready to go to the beach in North Carolina for a ten day vacation. Sandy turned five this year, so his mom...