RFC 1264 (rfc1264) – Page 2 of 8
Internet Engineering Task Force Internet Routing Protocol Standardization Criteria
Alternative Format: Original Text Document
RFC 1264 Routing Protocol Criteria October 1991 Routing protocols are complex, widely distributed, real-time algorithms. They are difficult to implement and to test. Even though a protocol may work in one environment with one implementation, that does not ensure that it will work in a different environment with multiple vendors. A routing protocol may work well within a range of topologies and number of networks and routers, but may fail when an unforeseen limit is reached. The result is that even with considerable operational experience, it is hard to guarantee that the protocol is mature enough for widespread deployment. The Internet is currently growing at an exponential rate. Routing protocols and the management of internet addressing are key elements in the successful operation the Internet. It is important that new routing protocols be designed to support this rapid growth. 3.0 General Requirements 1) Documents specifying the Protocol and its Usage. This may be one or more documents. The specifications for the routing protocol must be well written such that independent, interoperable implementations can be developed solely based on the specification. For example, it should be possible to develop an interoperable implementation without consulting the original developers of the routing protocol. 2) A Management Information Base (MIB) must be written for the protocol. Routing protocols, like all other internet protocols, need a MIB defined so they can be remotely managed. 3) A security architecture of the protocol must be defined. The security architecture must include mechanisms for authenticating routing messages and may include other forms of protection. 4) Generally, a number of interoperable implementations must exist. At least two must be written independently. 5) There must be evidence that all features of the protocol have been tested, running between at least two implementations. This must include that all of the security features have been demonstrated to operate, and that the mechanisms defined in the protocol actually provide the intended protection. 6) There must be operational experience with the routing protocol. The level of operational experience required is dependent on which level of standardization is requested. All significant features of the protocol must be exercised. In the case of an Interior Gateway Protocol (IGP), both interior and Hinden