<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-spring-srv6-security-consideration-11" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="SRv6 Security Considerations">Security Considerations for SRv6 Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-li-spring-srv6-security-consideration-11"/>
    <author initials="C." surname="Li" fullname="Cheng Li">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Xie" fullname="Chongfeng Xie">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xiechf@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="H." surname="Tian" fullname="Hui Tian">
      <organization>CAICT</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tianhui@caict.ac.cn</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="J." surname="Mao" fullname="Jianwei Mao">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>MaoJianwei@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="24"/>
    <area>Routing</area>
    <workgroup>Spring</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 99?>

<t>SRv6 inherits potential security vulnerabilities from source routing in general, and also from IPv6. This document describes various threats and security concerns related to SRv6 networks and existing approaches to solve these threats.</t>
    </abstract>
  </front>
  <middle>
    <?line 103?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Segment Routing (SR) <xref target="RFC8402"/> is a source routing paradigm that explicitly indicates the forwarding path for packets at the source node by inserting an ordered list of instructions, called segments. A segment can represent a topological or service-based instruction.</t>
      <t>When segment routing is deployed on IPv6 <xref target="RFC8200"/> dataplane, called SRv6 <xref target="RFC8754"/>, a segment is a 128-bit value, and can the IPv6 address of a local interface but it does not have to. For supporting SR, a new type of Routing Extension Header is defined and called the Segment Routing Header (SRH). The SRH contains a list of SIDs and other information such as Segments Left. The SRH is defined in <xref target="RFC8754"/>. By using the SRH, an ingress router can steer SRv6 packets into an explicit forwarding path so that many use cases like Traffic Engineering, Service Function Chaining can be deployed easily by SRv6. Note that, in some cases, a SRv6 packet may contain no SRH (see Section 3.1 in <xref target="RFC8754"/>).</t>
      <t>SRv6 inherits potential security vulnerabilities from source routing in general and also from IPv6 <xref target="RFC9099"/>. There are also some new vulnerabilities faced by SRv6.</t>
      <ul spacing="normal">
        <li>SRv6 makes use of the SRH which is a new type of Routing Extension Header. Therefore, the security properties of the Routing Extension Header are addressed by the SRH. See <xref target="RFC5095"/> and <xref target="RFC8754"/> for details.</li>
        <li>SRv6 consists of using the SRH on the IPv6 dataplane which security properties can be understood based on previous work <xref target="RFC4301"/>, <xref target="RFC4302"/>, <xref target="RFC4303"/> and <xref target="RFC4942"/>.</li>
      </ul>
      <t>This document describes various threats to SRv6 networks and also presents existing approaches to avoid or mitigate the threats.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document uses the terminology defined in <xref target="RFC5095"/> and <xref target="RFC8754"/>.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Implications in SRv6 Networks</name>
      <section anchor="vulnerabilities-of-sidssrh">
        <name>Vulnerabilities of SIDs/SRH</name>
        <t>SRv6 has similar vulnerabilities to source routing. The SIDs or SRH without protection or exposed to the external may be leveraged to launch attacks. The attackers can intercept/modify/falsify/abuse SIDs or SRH, which results in the following threats:</t>
        <ul spacing="normal">
          <li>DoS/DDoS attacks. The attacks can be launched by constructing segment lists to make packets be forwarded repeatedly between two or more routers or hosts on specific links <xref target="RFC5095"/>. The generation of ICMPv6 error messages may also be used in order to attempt DoS/DDoS attacks by sending an error-causing destination address or SRH in back-to-back packets <xref target="RFC8754"/>.</li>
          <li>Escaping security check such as access control or firewall. A segment list can be tailored to specify a particular path so that the malicious packets can bypass the firewall devices or reach otherwise-unreachable Internet systems <xref target="RFC8754"/>.</li>
          <li>Traffic interception. Unprotected SIDs can be used to intercept traffic. This threat can also be used for man-in-the-middle attacks.</li>
          <li>Topology discovery. SRH may leak network information such as topology, traffic flows, and service usage. <xref target="RFC8754"/> points out that the disclosure is less relevant to SR because an attacker has other means of learning topology, flows, and service usage.</li>
          <li>Identity Spoofing. An attacker spoofs other hosts' identity to use an authorized service.</li>
        </ul>
        <t>The above threats have been documented in previous work including <xref target="RFC5095"/>, <xref target="RFC8402"/>, <xref target="RFC8754"/>, and <xref target="RFC8986"/>, and there are already some mechanisms to deal with these threats.</t>
      </section>
      <section anchor="vulnerabilities-inherited-from-ipv6">
        <name>Vulnerabilities Inherited from IPv6</name>
        <t>SRv6 inherits potential security vulnerabilities from IPv6. A detailed analysis of IPv6 security considerations can be found in <xref target="RFC9099"/>.</t>
        <t>Some common threats will also exist in SRv6 networks such as:</t>
        <ul spacing="normal">
          <li>Eavesdropping of service data</li>
          <li>Packet Falsification</li>
          <li>Identity Spoofing</li>
          <li>Packet Replay</li>
          <li>DoS/DDoS</li>
        </ul>
        <t>The above threats are not specific to SRv6, existing IPv6 and IPv4 networks all need to cope with them.</t>
      </section>
      <section anchor="sec-impli-sec-dev">
        <name>Implications on Security Devices</name>
        <t>Firewall devices need to take care of SRv6 packets. Particularly, the stateful firewall needs to record the packet information (e.g., source and destination addresses) of the traffic from inside to outside. When receiving the returned flow, the stateful firewall checks whether such a flow exists in the record table. If not, the flow will be rejected.</t>
        <t>However, the source address of SRv6 packets can be any of the source node's address like a loopback address (depending on configuration). As a result, the address information of SR packets may be asymmetric (i.e., the source address of the forward packet is not the destination address of the returned packet), which leads to failed validation. The related problem has been analyzed and solved in <xref target="I-D.yang-spring-sid-as-source-address"/>.</t>
        <t>Another problem is that the destination address of a SRv6 packet is changing during forwarding because SRv6 hides the real destination address into the segment list. Boundary security devices may not learn the real destination address and fail to take access control on some SRv6 traffic. Besides, the hidden destination address possibly also result in asymmetric address information mentioned above and thus negatively impacts the effectiveness of security devices.</t>
      </section>
    </section>
    <section anchor="security-advice-on-srv6-networks">
      <name>Security Advice on SRv6 Networks</name>
      <t>SPRING architecture <xref target="RFC8402"/> allows clear trust domain boundaries so that source-routing information is only usable within the trusted domain and never exposed to the outside world. It is expected that, by default, explicit routing is only used within the boundaries of the administered domain. Therefore, the data plane does not expose any source routing information when a packet leaves the trusted domain. Traffic is filtered at the domain boundaries <xref target="RFC8402"/>.</t>
      <t>Maintaining such a trust boundary will efficiently avoid most of the threats described in <xref target="sec-considerations"/>. This section will present the detailed advice on trust domain operations.</t>
      <t>In most cases, the SR routers in the trust domain can be presumed to be operated by the same administrative entity without malicious intent and also according to specifications of the protocols that they use in the infrastructure. Hence, the SR-capable routers and transit IPv6 routers within the SRv6 trusted domains are trustworthy. The SRv6 packets are treated as normal IPv6 packets in transit nodes and the SRH will not bring new security problem.</t>
      <t>Of course, the above assumption is not always true in practice. Some normal security operations like those for IPv6 security are still recommended to be taken.</t>
      <section anchor="sec-filter">
        <name>Basic Traffic Filtering</name>
        <t>The basic security for maintaining a trust domain is described in <xref target="RFC8986"/> and <xref target="RFC8754"/>. For easier understanding, a simple example is shown in <xref target="srv6-sec"/>.</t>
        <figure anchor="srv6-sec">
          <name>SRv6 Security Policy Design</name>
          <artwork><![CDATA[
        ***************************              *****
        *             (3) h2      *              *   * SRv6 domain
        *               \ |       *              *****
 h1-----A-----B-----C-----D-------E-------F      
      / *    (2)    (2)  (2)      * \    
  (1,2) *                         *  (1,2)
        *                         *
        ***************************
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>A-E: SRv6 Routers inside the SRv6 domain. A and E are the edge routers which can also be called ingress router instead.</li>
          <li>F: Router F outside the SRv6 domain.</li>
          <li>h1: A host outside the SRv6 domain connects to Router A.</li>
          <li>h2: A host within the SRv6 domain, which connects to Router D.</li>
          <li>(1): The filtering point at external interfaces.</li>
          <li>(2): The filtering point at internal interfaces connecting to routers.</li>
          <li>(3): The filtering point at internal interfaces connecting to internal hosts.</li>
        </ul>
        <section anchor="acl-based-filtering-for-external-interfaces">
          <name>ACL-based Filtering for External Interfaces</name>
          <t>Typically, in any trusted domain, ingress routers <bcp14>MUST</bcp14> be configured with ACL at (1) in <xref target="srv6-sec"/>. Any packet externally received with SA/DA having a domain internal address will be filterred out. An SRv6 router typically comply with the same rule.</t>
          <t>A provider would generally do this for its internal address space in order to prevent access to internal addresses and in order to prevent spoofing. The technique is extended to the local SID space.</t>
          <t>It should be noted that, in some use cases, Binding SIDs can be leaked outside of SRv6 domain. Detailed ACL <bcp14>SHOULD</bcp14> be then configured at (1) in <xref target="srv6-sec"/> in order to allow the externally advertised Binding SIDs. The advertisement scope should be controlled to reduce security risks.</t>
        </section>
        <section anchor="acl-based-filtering-for-internal-interfaces">
          <name>ACL-based Filtering for Internal Interfaces</name>
          <t>An SRv6 router <bcp14>MUST</bcp14> support an ACL at (2) in <xref target="srv6-sec"/> with the following behavior:</t>
          <artwork><![CDATA[
1. IF (DA == LocalSID) && (SA != internal address or SID space) :
2.    drop
]]></artwork>
          <t>This prevents access to locally instantiated SIDs from outside the operator's infrastructure. Such ACL configuration should work for most cases except some particular ones. For example, specific SIDs can be used to provide resources to devices that are outside of the operator's infrastructure.</t>
        </section>
        <section anchor="sid-instantiation">
          <name>SID Instantiation</name>
          <t>As per the End definition <xref target="RFC8986"/>, an SRv6 router <bcp14>MUST</bcp14> only implement the End behavior on a local IPv6 address if that address has been explicitly enabled as an SRv6 SID. Thus, a local SID must be explicitly instantiated and explicitly bound to a behavior.</t>
          <t>The SRv6 packets received with destination address being a local address that has not been enabled as an SRv6 SID <bcp14>MUST</bcp14> be dropped.</t>
        </section>
        <section anchor="operational-considerations-of-basic-traffic-filtering">
          <name>Operational Considerations of Basic Traffic Filtering</name>
          <t>The internal device addresses such as SIDs and interface addresses are usually allocated from specific address blocks. That is, SIDs are from a SID block, and interface addresses belong to another address block. The internal device addresses are clearly distinct from IPv6 addresses allocated for end users, systems, and external networks (<xref target="RFC8754"/> and <xref target="RFC8986"/>).</t>
          <t>Therefore, conducting the above basic traffic filtering policies for maintaining the security of the SRv6 domain will not induce much operational overhead. Only a small number of ACLs need to be configured for matching seldom changing prefixes at specific interfaces <xref target="RFC8754"/>. Different routers typically comply with the same ACL rules. In addition, particular upgrades on devices are not required for supporting the basic traffic filtering policies.</t>
          <t>There are also some tools for flexible SID filtering (<xref target="RFC8956"/> and <xref target="I-D.ietf-idr-flowspec-srv6"/>), which will further simplifies SID control.</t>
        </section>
      </section>
      <section anchor="hmac-tlv">
        <name>HMAC TLV</name>
        <t>HMAC <xref target="RFC2104"/> is the enhanced security mechanism for SRv6 as defined in <xref target="RFC8754"/>. An operator of an SRv6 domain may delegate SRH addition to a host node within the SR domain. The SRv6 packets sent by the host can contain an HMAC TLV in SRH. The HMAC TLV can be used to ensure that 1) the SRH in a packet was applied by an authorized host, 2) the segments are authorized for use, and 3) the segment list is not modified after generation. HMAC processing can only happen at the ingress nodes (i.e., (3) in <xref target="srv6-sec"/>), and other nodes inside the trusted domain could ignore the HMAC TLV.</t>
        <t>Note that, the SRH is mutable in computing the Integrity Check Value (ICV) of AH <xref target="RFC8754"/>, and AH header is processed after SRH as recommended in <xref target="RFC8200"/>. Therefore, AH cannot be directly applied to SRv6 packets for securing SRH, and HMAC TLV is needed.</t>
      </section>
      <section anchor="source-address-validation">
        <name>Source Address Validation</name>
        <t>The ingress filtering mechanisms as defined in BCP 84 (<xref target="RFC3704"/> and <xref target="RFC8704"/>) are <bcp14>RECOMMENDED</bcp14> to be used for preventing source address spoofing. With packets carrying legitimate source addresses, many threats such as identity spoofing and source address spoofing-based DoS/DDoS can be avoided, and it will also benefit tracing back or locating malicious hosts or networks. Deploying source address validation is a common recommendation in the Internet <xref target="manrs-antispoofing"/>.</t>
      </section>
      <section anchor="control-plane-security-operations">
        <name>Control Plane Security Operations</name>
        <t>SRv6 information like SIDs can be advertised through various control plane protocols. The security of control plane should be considered. Existing authentication, encryption, filtering, and other security mechanisms of control plane protocols can be taken to ensure the security of SRv6 information. Segment Routing does not define any additional security mechanisms in existing control plane protocols <xref target="RFC8402"/>.</t>
        <t>From a perspective of trust domain, any information related to internal prefixes (like SIDs) and topology <bcp14>SHOULD NOT</bcp14> be exposed to the outside of the domain. Necessary filtering policies like route filtering need to be configured to prevent information leakage.</t>
      </section>
      <section anchor="icmpv6-rate-limiting">
        <name>ICMPv6 Rate-Limiting</name>
        <t>The ICMPv6 rate-limiting mechanism as defined in <xref target="RFC4443"/> can be used locally for preventing ICMPv6-based attacks (e.g., ICMPv6-based DoS/DDoS described in <xref target="sec-considerations"/>). ICMPv6 rate-limiting is a popular security action in IPv6 networks.</t>
      </section>
      <section anchor="ipsec">
        <name>IPSec</name>
        <t>IPSec <xref target="RFC4301"/> (AH <xref target="RFC4302"/>, ESP <xref target="RFC4303"/> ) can be used for authentication, encryption, and integrity protection. To some extent, the attacks including eavesdropping, packet falsification, identity spoofing, and packet replay can be avoided or mitigated through IPSec. Note that, IPSec cannot effectively protect SRH. As recommended in <xref target="RFC8200"/>, the processing order of SRH (also routing header) is higher than that of AH/ESP extension header. Besides, the SRH is mutable during forwarding process. Therefore, IPSec cannot be directly used to deal with source routing-related attacks.</t>
      </section>
      <section anchor="operations-related-to-security-devices">
        <name>Operations Related to Security Devices</name>
        <t>When computing segment lists for normal forwarding or path protection, make sure that the SRv6 path does not bypass the required security devices like firewall <xref target="I-D.li-rtgwg-enhanced-ti-lfa"/>.</t>
        <t>In some cases, stateful security devices (e.g., stateful firewall) are difficult to learn the accurate traffic state due to asymmetric address or hidden destination address (see <xref target="sec-impli-sec-dev"/>). To cope with the issues, operators <bcp14>SHOULD</bcp14> intentionally configure symmetric addresses on routers, e.g., a source address in a outbound packet is set to the destination address in the inbound packet. Besides, the stateful security devices <bcp14>SHOULD</bcp14> be able to figure out the real destination address of SRv6 flow, so that the recorded state can accurately detect the returned flow.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document attempts to give an overview of security considerations of operating an SRv6 network. The document itself does not import security issues.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Manty thanks to Charles Perkins and Stefano Previdi's valuable comments.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5095" target="https://www.rfc-editor.org/info/rfc5095" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5095.xml">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8402.xml">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754" target="https://www.rfc-editor.org/info/rfc8754" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8754.xml">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302" target="https://www.rfc-editor.org/info/rfc4302" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303" target="https://www.rfc-editor.org/info/rfc4303" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4942" target="https://www.rfc-editor.org/info/rfc4942" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4942.xml">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms. This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o issues due to the IPv6 protocol itself, o issues due to transition mechanisms, and o issues due to IPv6 deployment.</t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
        <reference anchor="RFC2104" target="https://www.rfc-editor.org/info/rfc2104" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2104.xml">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="M. Bellare" initials="M." surname="Bellare"/>
            <author fullname="R. Canetti" initials="R." surname="Canetti"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="RFC4443" target="https://www.rfc-editor.org/info/rfc4443" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9099" target="https://www.rfc-editor.org/info/rfc9099" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9099.xml">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.yang-spring-sid-as-source-address" target="https://datatracker.ietf.org/doc/html/draft-yang-spring-sid-as-source-address-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.yang-spring-sid-as-source-address.xml">
          <front>
            <title>SID as source address in SRv6</title>
            <author fullname="Feng Yang" initials="F." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>In SRv6 network, the SRv6 packets usually use loopback address as source address. However, when there is symmetric traffic requirement for bidirectional flow, or there is requirement for traffic source validation, using loopback address as source address is not sufficient. This document proposes using SID as source address for SRv6 traffic, also identifies solution for several use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-yang-spring-sid-as-source-address-02"/>
        </reference>
        <reference anchor="I-D.ietf-idr-flowspec-srv6" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-flowspec-srv6-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-flowspec-srv6.xml">
          <front>
            <title>BGP Flow Specification for SRv6</title>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Lei Li" initials="L." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Huaimo Chen" initials="H." surname="Chen">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Christoph Loibl" initials="C." surname="Loibl">
              <organization>Next Layer Communications</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc.</organization>
            </author>
            <author fullname="Yanhe Fan" initials="Y." surname="Fan">
              <organization>Casa Systems</organization>
            </author>
            <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Lei Liu" initials="L." surname="Liu">
              <organization>Fujitsu</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Volta Networks</organization>
            </author>
            <date day="6" month="April" year="2023"/>
            <abstract>
              <t>This document proposes extensions to BGP Flow Specification for SRv6 for filtering packets with a SRv6 SID that matches a sequence of conditions.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-srv6-03"/>
        </reference>
        <reference anchor="I-D.li-rtgwg-enhanced-ti-lfa" target="https://datatracker.ietf.org/doc/html/draft-li-rtgwg-enhanced-ti-lfa-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-rtgwg-enhanced-ti-lfa.xml">
          <front>
            <title>Enhanced Topology Independent Loop-free Alternate Fast Re-route</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Shraddha Hegde" initials="S." surname="Hegde">
              <organization>Juniper Networks Inc.</organization>
            </author>
            <date day="4" month="May" year="2023"/>
            <abstract>
              <t>Topology Independent Loop-free Alternate Fast Re-route (TI-LFA) aims at providing protection of node and adjacency segments within the Segment Routing (SR) framework. A key aspect of TI-LFA is the FRR path selection approach establishing protection over the expected post-convergence paths from the point of local repair. However, the TI-LFA FRR path may skip the node even if it is specified in the SID list to be traveled. This document defines Enhanced TI-LFA(TI-LFA+) by adding a No-bypass indicator for segments to ensure that the FRR route will not bypass the specific node, such as firewall. Also, this document defines No- bypass flag and No-FRR flag in SRH to indicate not to bypass nodes and not to perform FRR on all the nodes along the SRv6 path, respectively.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-rtgwg-enhanced-ti-lfa-08"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 289?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
