📄 rfc1246.txt
字号:
Network Working Group J. Moy, EditorRequest for Comments: 1246 July 1991 Experience with the OSPF protocolStatus of this MemoThis memo provides information for the Internet community. It does notspecify any Internet standard. Distribution of this memo is unlimited.AbstractThis is the second of two reports on the OSPF protocol. These reportsare required by the IAB/IESG in order for an Internet routing protocolto advance to Draft Standard Status. OSPF is a TCP/IP routing protocol,designed to be used internal to an Autonomous System (in other words,OSPF is an Interior Gateway Protocol).OSPF is currently designated as a Proposed Standard. Version 1 of theOSPF protocol was published in RFC 1131. Since then OSPF version 2 hasbeen developed. Version 2 has been documented in RFC 1247. The changesbetween version 1 and version 2 of the OSPF protocol are explained inAppendix F of RFC 1247. It is OSPF Version 2 that is the subject of thisreport.This report documents experience with OSPF V2. This includes reports oninteroperability testing, field experience, simulations and the currentstate of OSPF implementations. It also presents a summary of the OSPFManagement Information Base (MIB), and a summary of OSPF authenticationmechanism.Please send comments to ospf@trantor.umd.edu.1.0 IntroductionThis document addresses, for OSPF V2, the requirements set forth by theIAB/IESG for an Internet routing protocol to advance to Draft Standardstate. This requirements are briefly summarized below. The remainingsections of this report document how OSPF V2 satisfies theserequirements:[Moy] [Page 1]RFC 1246 Experience with OSPF July 1991o The specification for the routing protocol must be well written such that independent, interoperable implementations can be developed solely based on the specification. For example, it should be possible to develop an interoperable implementation without consulting the original developers of the routing protocol.o A Management Information Base (MIB) must be written for the protocol. The MIB must be in the standardization process, but does not need to be at the same level of standardization as the routing protocol.o The security architecture of the protocol must be set forth explicitly. The security architecture must include mechanisms for authenticating routing messages and may include other forms of protection.o Two or more interoperable implementations must exist. At least two must be written independently.o There must be evidence that all features of the protocol have been tested, running between at least two implementations. This must include that all of the security features have been demonstrated to operate, and that the mechanisms defined in the protocol actually provide the intended protection.o There must be significant operational experience. This must include running in a moderate number routers configured in a moderately complex topology, and must be part of the operational Internet. All significant features of the protocol must be exercised. In the case of an Interior Gateway Protocol (IGP), both interior and exterior routes must be carried (unless another mechanism is provided for the exterior routes). In the case of a Exterior Gateway Protocol (EGP), it must carry the full complement of exterior routes.This report is a compilation of information obtained from many people.The reader is referred to specific people when more information on asubject is available. People references are gathered into Section 10.0,in a format similar to that used in [4].1.1 AcknowledgmentsThe OSPF protocol has been developed by the OSPF Working Group of theInternet Engineering Task Force. Many people have contributed to thisreport. They are listed in Section 10.0 of this report.[Moy] [Page 2]RFC 1246 Experience with OSPF July 19912.0 DocumentationVersion 1 of the OSPF protocol is documented in RFC 1131 [1]. OSPFVersion 2, which supersedes Version 1, has been documented in RFC 1247[2]. The differences between OSPF Version 1 and Version 2 are relativelyminor, and are listed in Appendix F of RFC 1247 [2]. All informationpresented in this report concerns OSPF V2 unless explicitly mentionedotherwise.The OSPF protocol was developed by the OSPF Working Group of theInternet Engineering Task Force. This Working Group has a mailing list,ospf@trantor.umd.edu, where discussions of protocol features andoperation are held. The OSPF Working Group also meets during thequarterly Internet Engineering Task Force conferences. Reports of thesemeeting are published in the IETF's Proceedings. In addition, tworeports on the OSPF protocol have been presented to the IETF plenary(see "Everything You Ever Wanted to Know about OSPFIGP" in [5] and "OSPFUpdate" in [6]).The OSPF protocol began undergoing field trials in Spring of 1990. Amailing list, ospf-tests@seka.cso.uiuc.edu, was formed to discuss howthe field trials were proceeding. This mailing list is maintained byRoss Veach of the University of Illinois [rrv]. Archives of this listare also available. There has been quite a bit of discussion on the listconcerning OSPF/RIP/EGP interaction.A OSPF V2 Management Information Base has also been developed andpublished in [3]. For more information, see Section 3.0 of this report.There is a free implementation of OSPF available from the University ofMaryland. This implementation was written by Rob Coltun [rcoltun].Contact Rob for details.3.0 MIBAn OSPF Management Information Base has been published in RFC 1248 [3].The MIB was written by Rob Coltun [rcoltun] and Fred Baker [fbaker]. TheOSPF MIB appears on the mgmt subtree as SMI standard-mib 13.The OSPF MIB was originally developed by Rob Coltun of the University ofMaryland, under contract to Advanced Computer Communications. A subsetof his proposal was implemented to facilitate their development, andrepresents operational experience of a sort.The MIB consists of a general variables group and ten tables:TABLE 1. OSPF MIB Organization[Moy] [Page 3]RFC 1246 Experience with OSPF July 1991 Group Name Description ________________________________________________________________ ospfGeneralGroup General Global Variables ospfAreaTable Area Descriptions ospfStubAreaTable Default Metrics, by Type of Service ospfLsdbTable Link State Database ospfAreaRangeTable Address Range Specifications ospfHostTable Directly connected Hosts ospfIfTable OSPF Interface Variables ospfIfMetricTable Interface Metrics, by Type of Service ospfVirtIfTable Virtual Links ospfNbrTable (Non-virtual) OSPF Neighbors ospfVirtNbrTable Virtual OSPF NeighborsAs MIBs go, the OSPF MIB is quite large; 105 objects. The following aresome statistics describing the distribution of the MIB's variables:o 11 define the above Group and Tableso 10 define the Entry in a Tableo 7 are Counterso 6 are Gaugeso 68 objects mandated by the OSPF Version 2 SpecificationSection D.2 of the OSPF V2 specification [2] lists a set of requiredstatistics that an implementation must maintain. These statistics havebeen incorporated into the OSPF MIB. The MIB's thirteen Counters andGauges enable evaluation of the OSPF protocol's performance in anoperational environment. Most of the remainder of the MIB's variablesparameterize the many features that OSPF provides the networkadministrator.For more information on the MIB contact Fred Baker [fbaker].4.0 Security architectureIn OSPF, all protocol packet exchanges are authenticated. The OSPFpacket header (which is common to all OSPF packets) contains a 16-bitAuthentication type field, and 64-bits of Authentication data. Eachparticular OSPF area must run a single authentication scheme, asindicated by the Authentication type field. However, authentication keyscan be configured by the system administrator on a per-network basis.[Moy] [Page 4]RFC 1246 Experience with OSPF July 1991When an OSPF packet is received from a network, the OSPF router firstverifies that it indicates the correct Authentication type. The routerthen authenticates the packet, running a verification algorithm usingthe configured authentication key, the 64-bits of Authentication dataand the rest of the OSPF packet data as input. The precise algorithmused is dictated by the Authentication type. Packets failing theauthentication algorithm are dropped, and the authentication failure isnoted in a MIB-accessible variable (see [3]).There are currently few Authentication types in use. The currentassignments are:TABLE 2. Current OSPF Authentication types. Type code Algorithm ____________________________________________________________________ 0 No authentication performed. 1 Simple (clear) password. 2-255 Reserved for assignment by the IANA (iana@isi.edu) > 255 Available for local (per-AS) definition.For more information on OSPF's authentication procedures, see Sections8.1, 8.2, and Appendix E of [2].5.0 ImplementationsThe are multiple, interoperable implementations of OSPF currentlyavailable. This section gives a brief overview of the fiveimplementations that have participated in at least one round ofinteroperability testing. (For a detailed discussion of OSPFinteroperability testing, see Section 7.0 of this report.) Otherimplementations do exist, but because of commercial realities (e.g., theproduct is not yet announced) they unfortunately cannot be listed here.The five implementations that have participated in the OSPFinteroperability testing are (listed in alphabetical order):o 3com. This implementation was wholly developed by 3com. It has participated in all three rounds of interoperability testing. It is also the only implementation of OSPF's TOS routing.. The 3com implementation consists of approximately 9000 lines of C code, including comments but excluding user interface and MIB code. Consult Dino Farinacci [dino] for more details.[Moy] [Page 5]RFC 1246 Experience with OSPF July 1991o ACC. This implementation is based on the University of Maryland code. It participated in the last two rounds of interoperability testing. It also contains the only implementation of (a precursor to) the OSPF MIB (see Section 3.0 for details), which it uses for monitoring and configuration. The ACC implementation consists of approximately 24,000 lines of C code, including its OSPF MIB code. Consult Fred Baker [fbaker] for more details.o Proteon. This implementation was wholly developed by Proteon. It has participated in all three rounds of interoperability testing. It is also the only implementation that has a significant amount of field experience (see Section 6.0 for details). The Proteon implementation consists of approximately 9500 lines of C code, including comments but excluding user interface code. Consult John Moy [jmoy] for more details.o Wellfleet. This implementation has participated in all three rounds of interoperability testing. Consult Jonathan Hsu [jhsu] for more details.o University of Maryland. This implementation was developed wholly by Rob Coltun at the University of Maryland. It has formed the basis for a number of commercial OSPF implementations, and also participated in the latest round of interoperability testing. The University of Maryland implementation consists of approximately 10,000 lines of C
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -