Internet Engineering Task Force (IETF)                          K. Patel
Request for Comments: 8538                                        Arrcus
Updates: 4724                                                R. Fernando
Category: Standards Track                                  Cisco Systems
ISSN: 2070-1721                                               J. Scudder
                                                                J. Haas
                                                       Juniper Networks
                                                             March 2019


        Notification Message Support for BGP Graceful Restart

Abstract

  The BGP Graceful Restart mechanism defined in RFC 4724 limits the
  usage of BGP Graceful Restart to BGP messages other than BGP
  NOTIFICATION messages.  This document updates RFC 4724 by defining an
  extension that permits the Graceful Restart procedures to be
  performed when the BGP speaker receives a BGP NOTIFICATION message or
  the Hold Time expires.  This document also defines a new subcode for
  BGP Cease NOTIFICATION messages; this new subcode requests a full
  session restart instead of a Graceful Restart.

Status of This Memo

  This is an Internet Standards Track document.

  This document is a product of the Internet Engineering Task Force
  (IETF).  It represents the consensus of the IETF community.  It has
  received public review and has been approved for publication by the
  Internet Engineering Steering Group (IESG).  Further information on
  Internet Standards is available in Section 2 of RFC 7841.

  Information about the current status of this document, any errata,
  and how to provide feedback on it may be obtained at
  https://www.rfc-editor.org/info/rfc8538.















Patel, et al.                Standards Track                    [Page 1]

RFC 8538             Notification Support for BGP GR          March 2019


Copyright Notice

  Copyright (c) 2019 IETF Trust and the persons identified as the
  document authors.  All rights reserved.

  This document is subject to BCP 78 and the IETF Trust's Legal
  Provisions Relating to IETF Documents
  (https://trustee.ietf.org/license-info) in effect on the date of
  publication of this document.  Please review these documents
  carefully, as they describe your rights and restrictions with respect
  to this document.  Code Components extracted from this document must
  include Simplified BSD License text as described in Section 4.e of
  the Trust Legal Provisions and are provided without warranty as
  described in the Simplified BSD License.

Table of Contents

  1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
    1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
  2.  Modifications to BGP Graceful Restart Capability  . . . . . .   3
  3.  BGP Hard Reset Subcode  . . . . . . . . . . . . . . . . . . .   4
    3.1.  Sending a Hard Reset  . . . . . . . . . . . . . . . . . .   4
    3.2.  Receiving a Hard Reset  . . . . . . . . . . . . . . . . .   4
  4.  Operation . . . . . . . . . . . . . . . . . . . . . . . . . .   5
    4.1.  Rules for the Receiving Speaker . . . . . . . . . . . . .   6
  5.  Use of Hard Reset . . . . . . . . . . . . . . . . . . . . . .   7
    5.1.  When to Send a Hard Reset . . . . . . . . . . . . . . . .   7
    5.2.  Interaction with Other Specifications . . . . . . . . . .   7
  6.  Management Considerations . . . . . . . . . . . . . . . . . .   8
  7.  Operational Considerations  . . . . . . . . . . . . . . . . .   8
  8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   8
  9.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
  10. References  . . . . . . . . . . . . . . . . . . . . . . . . .   9
    10.1.  Normative References . . . . . . . . . . . . . . . . . .   9
    10.2.  Informative References . . . . . . . . . . . . . . . . .   9
  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  10
  Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  10














Patel, et al.                Standards Track                    [Page 2]

RFC 8538             Notification Support for BGP GR          March 2019


1.  Introduction

  For many classes of errors, BGP must send a NOTIFICATION message and
  reset the peering session to handle the error condition.  The BGP
  Graceful Restart mechanism defined in [RFC4724] requires that normal
  BGP procedures defined in [RFC4271] be followed when a NOTIFICATION
  message is sent or received.  This document defines an extension to
  BGP Graceful Restart that permits the Graceful Restart procedures to
  be performed when the BGP speaker receives a NOTIFICATION message or
  the Hold Time expires.  This permits the BGP speaker to avoid
  flapping reachability and continue forwarding while the BGP speaker
  restarts the session to handle errors detected in BGP.

  At a high level, this document can be summed up as follows.  When a
  BGP session is reset, both speakers operate as "Receiving Speakers"
  according to [RFC4724], meaning they retain each other's routes.
  This is also true for HOLDTIME expiration.  The functionality can be
  defeated by sending a BGP Cease NOTIFICATION message with the Hard
  Reset subcode.  If a Hard Reset is used, a full session reset is
  performed.

1.1.  Requirements Language

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
  "OPTIONAL" in this document are to be interpreted as described in
  BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
  capitals, as shown here.

2.  Modifications to BGP Graceful Restart Capability

  The BGP Graceful Restart Capability is augmented to signal the
  Graceful Restart support for BGP NOTIFICATION messages.  The Restart
  Flags field is augmented as follows (following the diagram in
  Section 3 of [RFC4724]).

  Restart Flags:

        This field contains bit flags relating to restart.

               0 1 2 3
              +-+-+-+-+
              |R|N|   |
              +-+-+-+-+

  The most significant bit is defined in [RFC4724] as the Restart State
  ("R") bit.




Patel, et al.                Standards Track                    [Page 3]

RFC 8538             Notification Support for BGP GR          March 2019


  The second most significant bit is defined in this document as the
  Graceful Notification ("N") bit.  It is used to indicate Graceful
  Restart support for BGP NOTIFICATION messages.  A BGP speaker
  indicates support for the procedures in this document by advertising
  a Graceful Restart Capability with its "N" bit set (value 1).

  If a BGP speaker that previously advertised a given set of Graceful
  Restart parameters opens a new session with a different set of
  parameters, these new parameters apply once the session has
  transitioned into ESTABLISHED state.

3.  BGP Hard Reset Subcode

  This document defines a new subcode for BGP Cease NOTIFICATION
  messages, called the Hard Reset subcode.  The value of this subcode
  is discussed in Section 8.  In this document, a BGP Cease
  NOTIFICATION message with the Hard Reset subcode is referred to as a
  "Hard Reset message" or simply as a "Hard Reset".

  When the "N" bit has been exchanged by two peers, NOTIFICATION
  messages other than Hard Reset messages are referred to as
  "Graceful", since such messages invoke Graceful Restart semantics.

3.1.  Sending a Hard Reset

  When the "N" bit has been exchanged, a Hard Reset message is used to
  indicate to the peer that the session is to be fully terminated.

  When sending a Hard Reset, the data portion of the NOTIFICATION
  message is encoded as follows:

      +--------+--------+--------
      | ErrCode| Subcode| Data
      +--------+--------+--------

  ErrCode is a BGP Error Code (as documented in the IANA "BGP Error
  (Notification) Codes" registry) that indicates the reason for the
  Hard Reset.  Subcode is a BGP Error Subcode (as documented in the
  IANA "BGP Error Subcodes" registry) as appropriate for the ErrCode.
  Similarly, Data is as appropriate for the ErrCode and Subcode.  In
  short, the Hard Reset encapsulates another NOTIFICATION message in
  its data portion.

3.2.  Receiving a Hard Reset

  Whenever a BGP speaker receives a Hard Reset, the speaker MUST
  terminate the BGP session following the standard procedures in
  [RFC4271].



Patel, et al.                Standards Track                    [Page 4]

RFC 8538             Notification Support for BGP GR          March 2019


4.  Operation

  A BGP speaker that is willing to receive and send BGP NOTIFICATION
  messages according to the procedures of this document MUST advertise
  the "N" bit using the Graceful Restart Capability as defined in
  [RFC4724].

  When such a BGP speaker has received the "N" bit from its peer, and
  receives from that peer a BGP NOTIFICATION message other than a Hard
  Reset, it MUST follow the rules for the Receiving Speaker mentioned
  in Section 4.1.  The BGP speaker generating the BGP NOTIFICATION
  message MUST also follow the rules for the Receiving Speaker.

  When a BGP speaker resets its session due to a HOLDTIME expiry, it
  should generate the relevant BGP NOTIFICATION message as mentioned in
  [RFC4271] but subsequently MUST follow the rules for the Receiving
  Speaker mentioned in Section 4.1.

  A BGP speaker SHOULD NOT send a Hard Reset to a peer from which it
  has not received the "N" bit.  We note, however, that if it did so,
  the effect would be as desired in any case because, according to
  [RFC4271] and [RFC4724], any NOTIFICATION message, whether recognized
  or not, results in a session reset.  Thus, the only negative effect
  to be expected from sending the Hard Reset to a peer that hasn't
  advertised compliance to this specification would be that the peer
  would be unable to properly log the associated information.

  Once the session is re-established, both BGP speakers SHOULD set
  their Forwarding State bit to 1.  If the Forwarding State bit is not
  set, then, according to the procedures in Section 4.2 of [RFC4724],
  the relevant routes will be flushed, defeating the goals of this
  specification.



















Patel, et al.                Standards Track                    [Page 5]

RFC 8538             Notification Support for BGP GR          March 2019


4.1.  Rules for the Receiving Speaker

  Section 4.2 of [RFC4724] defines rules for the Receiving Speaker.
  This document modifies those rules as follows:

  The sentence "To deal with possible consecutive restarts, a route
  (from the peer) previously marked as stale MUST be deleted" only
  applies when the "N" bit has not been exchanged with the peer:

  OLD: When the Receiving Speaker detects termination of the TCP
       session for a BGP session with a peer that has advertised the
       Graceful Restart Capability, it MUST retain the routes received
       from the peer for all the address families that were previously
       received in the Graceful Restart Capability and MUST mark them
       as stale routing information.  To deal with possible consecutive
       restarts, a route (from the peer) previously marked as stale
       MUST be deleted.  The router MUST NOT differentiate between
       stale and other routing information during forwarding.

  NEW: When the Receiving Speaker detects termination of the TCP
       session for a BGP session with a peer that has advertised the
       Graceful Restart Capability, it MUST retain the routes received
       from the peer for all the address families that were previously
       received in the Graceful Restart Capability and MUST mark them
       as stale routing information.  The router MUST NOT differentiate
       between stale and other routing information during forwarding.
       If the "N" bit has not been exchanged with the peer, then to
       deal with possible consecutive restarts, a route (from the peer)
       previously marked as stale MUST be deleted.

  The stale timer is given a formal name and made mandatory:

  OLD: To put an upper bound on the amount of time a router retains the
       stale routes, an implementation MAY support a (configurable)
       timer that imposes this upper bound.

  NEW: To put an upper bound on the amount of time a router retains the
       stale routes, an implementation MUST support a (configurable)
       timer, called the "stale timer", that imposes this upper bound.
       A suggested default value for the stale timer is 180 seconds.
       An implementation MAY provide the option to disable the timer
       (i.e., to provide an infinite retention time) but MUST NOT do so
       by default.








Patel, et al.                Standards Track                    [Page 6]

RFC 8538             Notification Support for BGP GR          March 2019


5.  Use of Hard Reset

5.1.  When to Send a Hard Reset

  Although when to send a Hard Reset is an implementation-specific
  decision, we offer some advice.  Many Cease NOTIFICATION subcodes
  represent permanent or long-term, rather than transient, session
  termination.  Because of this, it's appropriate to use Hard Reset
  with them.  As of publication of this document, subcodes 1-9 have
  been defined for Cease.  The following table lists each of these
  subcodes along with suggested behavior.

  +-------+------------------------------------+----------------------+
  | Value |                Name                |  Suggested Behavior  |
  +-------+------------------------------------+----------------------+
  |   1   | Maximum Number of Prefixes Reached |      Hard Reset      |
  |   2   |      Administrative Shutdown       |      Hard Reset      |
  |   3   |         Peer De-configured         |      Hard Reset      |
  |   4   |        Administrative Reset        | Provide user control |
  |   5   |        Connection Rejected         |    Graceful Cease    |
  |   6   |     Other Configuration Change     |    Graceful Cease    |
  |   7   |  Connection Collision Resolution   |    Graceful Cease    |
  |   8   |          Out of Resources          |    Graceful Cease    |
  |   9   |             Hard Reset             |      Hard Reset      |
  +-------+------------------------------------+----------------------+

  These suggestions are only that -- suggestions, not requirements.
  It's the nature of BGP implementations that the mapping of internal
  states to BGP NOTIFICATION codes and subcodes is not always perfect.
  The guiding principle for the implementor should be that if there is
  no realistic hope that forwarding can continue or that the session
  will be re-established within the deadline, Hard Reset should be
  used.

  For all NOTIFICATION codes other than Cease, use of Hard Reset does
  not appear to be indicated.

5.2.  Interaction with Other Specifications

  "BGP Administrative Shutdown Communication" [RFC8203] specifies use
  of the data portion of the Administrative Shutdown or Administrative
  Reset subcodes to convey a short message.  When [RFC8203] is used in
  conjunction with Hard Reset, the subcode of the outermost Cease MUST
  be Hard Reset, with the Administrative Shutdown or Administrative
  Reset subcodes encapsulated within.  The encapsulated message MUST
  subsequently be processed according to [RFC8203].





Patel, et al.                Standards Track                    [Page 7]

RFC 8538             Notification Support for BGP GR          March 2019


6.  Management Considerations

  When reporting a Hard Reset to network management, the error code and
  subcode reported MUST be Cease and Hard Reset, respectively.  If the
  network management layer in use permits it, the information carried
  in the Data portion SHOULD be reported as well.

7.  Operational Considerations

  Note that long (or infinite) retention time may cause operational
  issues and should be enabled with care.

8.  IANA Considerations

  IANA has assigned subcode 9 ("Hard Reset") in the "BGP Cease
  NOTIFICATION message subcodes" registry.

  IANA has created a sub-registry called "BGP Graceful Restart Flags"
  under the "Border Gateway Protocol (BGP) Parameters" registry.  The
  registration procedure is Standards Action [RFC8126]; this document
  and [RFC4724] are listed as references.  The initial values are as
  follows:

        +--------------+---------------+------------+-----------+
        | Bit Position |      Name     | Short Name | Reference |
        +--------------+---------------+------------+-----------+
        |      0       | Restart State |     R      |  RFC 4724 |
        |      1       |  Notification |     N      |  RFC 8538 |
        |     2-3      |   Unassigned  |            |           |
        +--------------+---------------+------------+-----------+

  IANA has created a sub-registry called "BGP Graceful Restart Flags
  for Address Family" under the "Border Gateway Protocol (BGP)
  Parameters" registry.  The registration procedure is Standards
  Action; this document and [RFC4724] are listed as references.  The
  initial values are as follows:

      +--------------+------------------+------------+-----------+
      | Bit Position |       Name       | Short Name | Reference |
      +--------------+------------------+------------+-----------+
      |      0       | Forwarding State |     F      |  RFC 4724 |
      |     1-7      |    Unassigned    |            |           |
      +--------------+------------------+------------+-----------+








Patel, et al.                Standards Track                    [Page 8]

RFC 8538             Notification Support for BGP GR          March 2019


9.  Security Considerations

  This specification doesn't change the basic security model inherent
  in [RFC4724], with the exception that the protection against repeated
  resets is relaxed.  To mitigate the consequent risk that an attacker
  could use repeated session resets to prevent stale routes from ever
  being deleted, we make the stale timer mandatory (in practice, it is
  already ubiquitous).  To the extent [RFC4724] might be said to help
  defend against denials of service by making the control plane more
  resilient, this extension may modestly increase that resilience;
  however, there are enough confounding and deployment-specific factors
  that no general claims can be made.

10.  References

10.1.  Normative References

  [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119,
             DOI 10.17487/RFC2119, March 1997,
             <https://www.rfc-editor.org/info/rfc2119>.

  [RFC4271]  Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
             Border Gateway Protocol 4 (BGP-4)", RFC 4271,
             DOI 10.17487/RFC4271, January 2006,
             <https://www.rfc-editor.org/info/rfc4271>.

  [RFC4724]  Sangli, S., Chen, E., Fernando, R., Scudder, J., and Y.
             Rekhter, "Graceful Restart Mechanism for BGP", RFC 4724,
             DOI 10.17487/RFC4724, January 2007,
             <https://www.rfc-editor.org/info/rfc4724>.

  [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
             2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
             May 2017, <https://www.rfc-editor.org/info/rfc8174>.

  [RFC8203]  Snijders, J., Heitz, J., and J. Scudder, "BGP
             Administrative Shutdown Communication", RFC 8203,
             DOI 10.17487/RFC8203, July 2017,
             <https://www.rfc-editor.org/info/rfc8203>.

10.2.  Informative References

  [RFC8126]  Cotton, M., Leiba, B., and T. Narten, "Guidelines for
             Writing an IANA Considerations Section in RFCs", BCP 26,
             RFC 8126, DOI 10.17487/RFC8126, June 2017,
             <https://www.rfc-editor.org/info/rfc8126>.




Patel, et al.                Standards Track                    [Page 9]

RFC 8538             Notification Support for BGP GR          March 2019


Acknowledgements

  The authors would like to thank Jim Uttaro for the suggestion.  The
  authors would also like to thank Emmanuel Baccelli, Bruno Decraene,
  Chris Hall, Warren Kumari, Paul Mattes, Robert Raszuk, and Alvaro
  Retana for their reviews and comments.

Authors' Addresses

  Keyur Patel
  Arrcus

  Email: [email protected]


  Rex Fernando
  Cisco Systems
  170 W. Tasman Drive
  San Jose, CA  95134
  United States of America

  Email: [email protected]


  John Scudder
  Juniper Networks
  1194 N. Mathilda Ave
  Sunnyvale, CA  94089
  United States of America

  Email: [email protected]


  Jeff Haas
  Juniper Networks
  1194 N. Mathilda Ave
  Sunnyvale, CA  94089
  United States of America

  Email: [email protected]











Patel, et al.                Standards Track                   [Page 10]