Internet-Draft | draft-deng-rtgwg-srv6-te-endpoint-protec | July 2025 |
Deng & Zhu | Expires 8 January 2026 | [Page] |
SRv6 TE achieves precise traffic engineering by strictly defining the traffic path (e.g., specifying particular nodes or links) through a predefined SID list. To address the failure of TI-LFA FRR protection in SRv6 TE Policy scenarios due to strict node constraints, this paper proposes an SRv6 designated Midpoint protection.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 8 January 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
In SRv6 Best Effort (BE) forwarding, all nodes in the network rely on the same Link-State Database (LSDB) and use the Shortest Path First (SPF) algorithm to compute optimal routes, adhering to IGP shortest-path forwarding. When a link or node fails, traffic is switched to a backup path based on the IGP topology convergence. However, there may be prolonged packet loss and degraded service quality when IGP route convergence typically takes a long time in large-scale topologies. To achieve fast reroute (FRR) for SRv6 BE, a loop-free backup path must be pre-established in the forwarding plane.¶
The specific implementation for SRv6 BE link/node failure protection involves deploying TI-LFA (Topology-Independent Loop-Free Alternate), which enables the source node to specify an explicit path that bypasses the failed link and provide a local repair mechanism for IGP-based shortest paths. This ensures end-to-end traffic recovery in the event of direct link or neighbor failures. TI-LFA does not depend on network topology and provides a loop-free backup path. It calculates the FRR backup path based on the post-failure converged topology, ensuring alignment between the FRR backup path and the final post-convergence reroute path. This avoids secondary path switching. Specifically, TI-LFA excludes the failed node or link when computing the FRR path and then derives the backup path.¶
The current local repair mechanism, e.g., TI-LFA, allows the upstream neighbor of the failed node or link to fast re-route traffic around the failure. This mechanism does not work properly for SRv6 TE path after the failure happens in an endpoint node and IGP converges on the failure. This document defines midpoint protection for SRv6 TE path, which enables the upstream endpoint node of the failed node to perform the endpoint behavior for the faulty node and fast re-route traffic around the failure after IGP converges on the failure.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] .¶
Midpoint protection (Endpoint node) refers to the node where the SID specified in the Segment List. SRv6 Policy explicitly steers packets along a predetermined path by encapsulating a sequence of SRv6 SIDs in the Segment Routing Header (SRH). SRv6 Policy does not necessarily follow SPF shortest-path forwarding, and the IPv6 destination address is not the final packet destination. Therefore, the conventional SRv6 BE FRR which computes backup next hops based on destination addresses and SPF paths—cannot be applied in SRv6 Policy. When a link/node specified in the SRv6 Policy fails, traffic must bypass the faulty link/node via a pre-established loop-free backup path to ensure failure protection. The designated node failure protection scheme is uniformly applied in such cases.¶
The upstream node (Point of Local Repair, PLR) of the failed Endpoint node takes over the forwarding process. Normally, an Endpoint node processes SRv6 packets by: Decrementing the Segment Left (SL) and copying the next-layer SID to the IPv6 destination address field. However, if an Endpoint node fails, it cannot execute these SID processing actions, resulting in packet loss. Thus, when an Endpoint node fails, packets should bypass it, and the PLR must forward them directly to the next Endpoint node. When the PLR egress interface detects a failure, it executes the following protection process:¶
a) When the PLR’s FIB contains a route to the failed Endpoint: If the PLR is not directly connected to the failed Endpoint node, standard TI-LFA is executed. If the PLR is directly connected, it bypasses the failed Endpoint node by rewriting the IPv6 destination address to the next Endpoint node’s address in the SRH, preventing traffic from being forwarded to the faulty node.¶
b) When the PLR’s FIB lacks a route to the failed Endpoint: Bypass the faulty Endpoint and directly forward the data packet to the next endpoint node. If PLR detects that the next-hop interface has failed, when the next hop matches the packet’s destination address and SL > 0, the PLR proxies the Endpoint behavior: it decrements SL, updates the outer IPv6 header’s destination address with the next SID, and forwards the packet according to the new SID’s instructions, thereby bypassing the failed node and achieving SRv6 Endpoint node protection.¶
As shown in Figure 1:¶
a) Node A forwards a packet to destination Node F, specifying intermediate Node E in the SRH.¶
b) When Node E fails, Node B (PLR) detects the next-hop interface failure. Since the next hop matches the current destination address 5:: and SL > 0, Node B performs proxy forwarding: Decrements SL and copies the next SID 6:: to the outer IPv6 destination field. If the segment has the Penultimate Segment Pop (PSP) attribute, node B removes the SRH and forwards based on 6::.¶
c) Since the primary next hop for 6:: is still Node E—but Node B is not the penultimate hop for this destination and SL = 0—Node B no longer qualifies for proxy forwarding. Instead, it follows the standard TI-LFA process, switching to a backup path. The repair segment list is encapsulated via "H.Insert" (e.g., adding SID 3::1), and a new SRH is appended before forwarding to Node F via the backup path.¶
d) After Node A detects Node E’s failure and IGP convergence completes, Node A removes the routing entry for 5::. Thus, when Node A attempts to forward based on 5::, it misses the route and acts as the PLR: - Decrements SL. Updates the outer IPv6 destination address to 6::. Forwards to Node B based on 6::.¶
If Node B has converged, it forwards the packet to Node F via the new shortest path. If not, Node B follows TI-LFA and forwards via the backup path. To support SRv6 Endpoint failure protection, the SRv6 SID forwarding pseudocode must include additional logic to guide PLR actions during Endpoint failures.¶
+-----------------------------------------------------------------------+ | x failure | | IPv6 DA=5:: IPv6 DA=3::1 | | SRH(SL=1) SRH(SL=1) | | (6::,5::) (6::,3::1) | | Payload Payload | 1:: 2:: 3:: | | +-------+ +-------+ COST=10 +-------+ | | | A |---------| B |------------| C | End.X=3::1 | | +-------+ +-------+ +-------+ | | | | | | COST=10 | | cost=1000 | | | End.X=3::1 | | | +---X---+ +-------+ +-------+ | | | E |------------| D |--------| F | | | +-------+ COST=10 +-------+ +-------+ | | 5:: 4:: 6:: | | | +-----------------------------------------------------------------------+ Figure 1: SRv6 Endpoint protection¶
The behavior described in this document is internal functionality to a router that result in the ability to explicitly steer traffic over the post convergence path after a remote topology change in a manner that guarantees loop freeness. Because the behavior serves to minimize the disruption associated with a topology changes, it can be seen as a modest security enhancement.¶
No requirements for IANA.¶
The authors would like to thank everyone who contributed to the draft.¶