<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-spring-srv6-security-14" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Segment Routing IPv6 Security Considerations">Segment Routing IPv6 Security Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-security-14"/>
    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Mizrahi" fullname="Tal Mizrahi">
      <organization>Huawei</organization>
      <address>
        <email>tal.mizrahi.phd@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="L. M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="F." surname="Gont" fullname="Fernando Gont">
      <organization>SI6 Networks</organization>
      <address>
        <email>fgont@si6networks.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="13"/>
    <area>Routing</area>
    <workgroup>Source Packet Routing in Networking</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 109?>

<t>SRv6 is a traffic engineering, encapsulation and steering mechanism utilizing IPv6 addresses to identify segments in a pre-defined policy. This document discusses security considerations in SRv6 networks, including the potential threats and the possible mitigation methods. The document does not define any new security protocols or extensions to existing protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-spring-srv6-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Packet Routing in Networking Working Group mailing list (<eref target="mailto:spring@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spring/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spring/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.</t>
    </note>
  </front>
  <middle>
    <?line 113?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing (SR) <xref target="RFC8402"/> utilizing an IPv6 data plane is a source routing model that leverages an IPv6 underlay. It uses an IPv6 extension header called the Segment Routing Header (SRH) <xref target="RFC8754"/>. This header is used to signal and control the forwarding and path of packets by imposing an ordered list of
segments that are processed at each hop along the signaled path. SRv6 is fundamentally bound to the IPv6 protocol and introduces the aforementioned new extension header. There are security considerations which must be noted or addressed in order to operate an SRv6 network in a reliable and secure manner.
Specifically, some primary properties of SRv6 that affect the security considerations are:</t>
      <ul spacing="normal">
        <li>
          <t>SRv6 may use the SRH which is a type of Routing Extension Header defined by <xref target="RFC8754"/>.
Security considerations of the SRH are discussed in Section 7 of <xref target="RFC8754"/>, and were based in part on security considerations of the deprecated routing header 0 as discussed in Section 5 of <xref target="RFC5095"/>.</t>
        </li>
        <li>
          <t>SRv6 uses the IPv6 data-plane, and therefore security considerations of IPv6 are applicable to SRv6 as well. Some of these considerations are discussed in Section 10 of <xref target="RFC8200"/> and in <xref target="RFC9099"/>.</t>
        </li>
        <li>
          <t>While SRv6 uses what appear to be typical IPv6 addresses, the address space is processed differently by segment endpoints.
A typical IPv6 unicast address is comprised of a network prefix and a host identifier.
A typical SRv6 segment identifier (SID) is comprised of a locator, a function identifier, and optionally, function arguments.
The locator must be routable, which enables both SRv6 capable and incapable devices to participate in forwarding, either as normal IPv6 unicast or SRv6 segment endpoints.
The capability to operate in environments that may have gaps in SRv6 support allows the bridging of islands of SRv6 devices with standard IPv6 unicast routing.</t>
        </li>
      </ul>
      <t>This document describes various threats to SRv6 networks and also presents existing approaches to avoid or mitigate the threats.</t>
    </section>
    <section anchor="scope-of-this-document">
      <name>Scope of this Document</name>
      <t>The following IETF RFCs were selected for security assessment as part of this effort:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC8402"/> : Segment Routing Architecture</t>
        </li>
        <li>
          <t><xref target="RFC8754"/> : IPv6 Segment Routing Header (SRH)</t>
        </li>
        <li>
          <t><xref target="RFC8986"/> : Segment Routing over IPv6 (SRv6) Network Programming</t>
        </li>
        <li>
          <t><xref target="RFC9020"/> : YANG Data Model for Segment Routing</t>
        </li>
        <li>
          <t><xref target="RFC9256"/> : Segment Routing Policy Architecture</t>
        </li>
        <li>
          <t><xref target="RFC9491"/> : Integration of the Network Service Header (NSH) and Segment Routing for Service Function Chaining (SFC)</t>
        </li>
        <li>
          <t><xref target="RFC9524"/> : Segment Routing Replication for Multipoint Service Delivery</t>
        </li>
        <li>
          <t><xref target="RFC9800"/> : Compressed SRv6 Segment List Encoding</t>
        </li>
      </ul>
      <t>We note that SRv6 is under active development and, as such, the above documents might not cover all protocols employed in an SRv6 deployment.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>HMAC TLV: Hashed Message Authentication Code Type Length Value <xref target="RFC8754"/></t>
          </li>
          <li>
            <t>SID: Segment Identifier <xref target="RFC8402"/></t>
          </li>
          <li>
            <t>SRH: Segment Routing Header <xref target="RFC8754"/></t>
          </li>
          <li>
            <t>SRv6: Segment Routing over IPv6 <xref target="RFC8402"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="threat">
      <name>Threat Terminology</name>
      <t>This section introduces the threat taxonomy that is used in this document. This taxonomy is based on terminology from the Internet threat model <xref target="RFC3552"/>, as well as some concepts from <xref target="RFC9055"/>, <xref target="RFC7384"/>, <xref target="RFC7835"/>, and <xref target="RFC9416"/>.</t>
      <dl>
        <dt>Internal vs. External:</dt>
        <dd>
          <t>An internal attacker in the context of SRv6 is an attacker who is located within an SR domain.  Specifically, an internal attacker either has access to a node in the SR domain, or is located within the premises of the SR domain.  External attackers, on the other hand, are not within the SR domain.</t>
        </dd>
        <dt>On-path vs. Off-path:</dt>
        <dd>
          <t>On-path attackers are located in a position that allows interception, modification or dropping of in-flight packets, as well as insertion (generation) of packets. Off-path attackers can only attack by insertion of packets.</t>
        </dd>
        <dt>Data plane vs. control plane vs. Management plane:</dt>
        <dd>
          <t>Attacks can be classified based on the plane they target: data, control, or management. The distinction between on-path and off-path attackers depends on the plane where the attack occurs. For instance, an attacker might be off-path from a data plane perspective but on-path from a control plane perspective.</t>
        </dd>
      </dl>
      <t>The following figure depicts an example of an SR domain with five attacker types, labeled 1-5. As an example, attacker 2 is located along the path between the SR ingress node and SR endpoint 1, and is therefore an on-path attacker both in the data plane and in the control plane. Thus, attacker 2 can listen, insert, delete, modify or replay data plane and/or control plane packets in transit. Off-path attackers, such as attackers 4 and 5, can insert packets, and in some cases can passively listen to some traffic, such as multicast transmissions. In this example a Path Computation Element as a Central Controller (PCECC) <xref target="RFC9050"/> is used as part of the control plane. Thus, attacker 3 is an internal on-path attacker in the control plane, as it is located along the path between the PCECC and SR endpoint 1.</t>
      <figure anchor="threat-figure">
        <name>Threat Model Taxonomy</name>
        <artwork><![CDATA[
  1.on-path   2.on-path   3.cont.  PCE as a Central  4.off-path 5.off-path
  external    internal    plane    Controller        internal   external
  attacker    attacker    on-path  (PCECC)           attacker   attacker
       |            |           |        |            |          |
       |            |           v  _____ v ____     _ | __       |
       |     SR  __ | _  __   /        +---+   \___/  |   \      |
       | domain /   |  \/  \_/  X-----|PCECC|         v   /      v
       |        \   |           |      +---+          X   \      X
       v        /   v           |                         /
 ----->X------>O--->X---------->O------->O-------------->O---->
               ^\               ^       /^\             /^
               | \___/\_    /\_ | _/\__/ | \___/\______/ |
               |        \__/    |        |               |
               |                |        |               |
              SR               SR        SR              SR
              ingress      endpoint 1   endpoint 2       egress
              node                                       node
]]></artwork>
      </figure>
      <t>This document uses the term "SR domain" as defined in <xref target="RFC8402"/>: "the set of nodes participating in the source-based routing model...". By default, <xref target="RFC8402"/> assumes operation "within a trusted domain" with traffic filtered at the domain boundaries, as further discussed in <xref target="filtering"/>. In this document, unless stated otherwise, the boundary that distinguishes internal from external attackers is the boundary of the SR domain, and the term trusted domain denotes an SR domain for which the boundary‑filtering assumption of <xref target="RFC8402"/> is in force. Note that the trusted domain is a logical/operational construct, not a physical boundary. Thus, hosts and servers on the same physical network are not part of the trusted domain unless explicitly brought under its controls.</t>
      <t>Inter‑SR‑domain scenarios are out of scope, including cases where multiple SR instances exist under the same administrative entity but are logically or operationally distinct; such cases are treated as separate SR domains for the purposes of this draft. Specifically, an attack on one domain that is invoked from within a different domain is considered an external attack in the context of the current document.</t>
    </section>
    <section anchor="sec-effect">
      <name>Effect</name>
      <t>One of the important aspects of threat analysis is assessing the potential effect or outcome of each threat. SRv6 allows for the forwarding of IPv6 packets via predetermined SR policies, which determine the paths and the processing of these packets. An attack on SRv6 may cause packets to traverse arbitrary paths and to be subject to arbitrary processing by SR endpoints and transit routers within an SR domain. This may allow an attacker to perform a number of attacks on the victim networks and hosts that would be mostly unfeasible for a non-SRv6 environment.</t>
      <t>The threat model in <xref target="ITU-Sec"/> classifies threats according to their potential effect, defining six categories. For each of these categories we briefly discuss its applicability to SRv6 attacks.</t>
      <ul spacing="normal">
        <li>
          <t>Unauthorized Access: an attacker may leverage SRv6 to circumvent security controls when security devices fail to enforce SRv6 policies. For example, this can occur if packets are directed through paths where packet filtering policies are not enforced, or if some security policies are not enforced in the presence of IPv6 Extension Headers.</t>
        </li>
        <li>
          <t>Masquerade: various attacks that result in spoofing or masquerading are possible in IPv6 networks (e.g., <xref target="RFC9099"/>). However, these attacks are not specific to SRv6, and are therefore not within the scope of this document.</t>
        </li>
        <li>
          <t>System Integrity: attacks on SRv6 can manipulate the path and the processing that the packet is subject to, thus compromising the integrity of the system. Furthermore, an attack that compromises the control plane and/or the management plane is also a means of affecting the system integrity. A specific SRv6-targeted attack may cause one or more of the following outcomes:
          </t>
          <ul spacing="normal">
            <li>
              <t>Avoiding a specific node or path: when an SRv6 policy is manipulated, specific nodes or paths may be bypassed, for example in order to avoid the billing service or circumvent access controls and security filters.</t>
            </li>
            <li>
              <t>Preferring a specific path: packets can be manipulated so that they are diverted to a specific path. This can result in allowing various unauthorized services such as traffic acceleration. Alternatively, an attacker can divert traffic to be forwarded through a specific node that the attacker has access to, which facilitates more complex on-path attacks such as passive listening, reconnaissance, and various man-in-the-middle attacks.</t>
            </li>
            <li>
              <t>Causing header modifications: SRv6 network programming <xref target="RFC8986"/> determines the SR endpoint behavior, including potential header modifications. Thus, one of the potential outcomes of an attack is unwanted header modifications.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Communication Integrity: SRv6 attacks may cause packets to be forwarded through paths that the attacker controls, which may facilitate other attacks that compromise the integrity of user data. Integrity protection of user data, which is implemented in higher layers, avoids these aspects, and therefore communication integrity is not within the scope of this document.</t>
        </li>
        <li>
          <t>Confidentiality: as in communication integrity, packets forwarded through unintended paths may traverse nodes controlled by the attacker. Since eavesdropping of user data can be avoided by using encryption in higher layers, it is not within the scope of this document. However, eavesdropping of a network that uses SRv6 is a specific form of reconnaissance. This reconnaissance allows the attacker to collect information about SR endpoint addresses, SR policies, and network topologies.</t>
        </li>
        <li>
          <t>Denial of Service: the availability aspects of SRv6 include the ability of attackers to leverage SRv6 as a means for compromising the performance of a network or for causing Denial of Service (DoS), including:
          </t>
          <ul spacing="normal">
            <li>
              <t>Resource exhaustion: compromising the availability of the system can be achieved by sending SRv6-enabled packets to/through victim nodes in a way that results in a negative performance impact of the victim systems (e.g., <xref target="RFC9098"/>). For example, network programming can be used in some cases to manipulate segment endpoints to perform unnecessary functions that consume processing resources. Resource exhaustion may in severe cases cause Denial of Service (DoS).</t>
            </li>
            <li>
              <t>Forwarding loops: an attacker might achieve attack amplification by increasing the number hops that each packet is forwarded through and thus increase the load on the network. For instance, a set of SIDs can be inserted in a way that creates a forwarding loop (<xref target="RFC8402"/>, <xref target="RFC5095"/>, <xref target="CanSecWest2007"/>) and thus loads the nodes along the loop.</t>
            </li>
            <li>
              <t>Causing packets to be discarded: an attacker may cause a packet to be forwarded to a point in the network where it can no longer be forwarded, causing the packet to be discarded.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Note that the categories in this section are effects‑based and intentionally not mutually exclusive; for example, "circumvent access controls and security filters" also falls under Unauthorized Access, but is listed here to emphasize the system integrity impact of path/policy manipulation. <xref target="attacks"/> discusses specific implementations of these attacks, and possible mitigations are discussed in <xref target="mitigations"/>.</t>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <section anchor="abstractions">
        <name>Attack Abstractions</name>
        <t>Packet manipulation and processing attacks can be implemented by performing a set of one or more basic operations. These basic operations (abstractions) are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Passive listening: an attacker who reads packets off the network can collect information about SR endpoint addresses, SR policies and the network topology. This information can then be used to deploy other types of attacks.</t>
          </li>
          <li>
            <t>Packet replaying: in a replay attack the attacker records one or more packets and transmits them at a later point in time. This could lead to using more resources or security devices being unable to track connections correctly.</t>
          </li>
          <li>
            <t>Packet insertion: an attacker generates and injects a packet to the network. The generated packet may be maliciously crafted to include false information; including false addresses, SRv6-related information, or other intentionally incorrect information.</t>
          </li>
          <li>
            <t>Packet deletion: by intercepting and removing packets from the network, an attacker prevents these packets from reaching their destination. Selective removal of packets may, in some cases, cause more severe damage than random packet loss.</t>
          </li>
          <li>
            <t>Packet modification: the attacker modifies packets during transit.</t>
          </li>
        </ul>
        <t>This section describes attacks that are based on packet manipulation and processing, as well as attacks performed by other means. While it is possible for packet manipulation and processing attacks against all the fields of the IPv6 header and its extension headers, this document limits itself to the IPv6 header and the SRH.</t>
      </section>
      <section anchor="data-plane-attacks">
        <name>Data Plane Attacks</name>
        <section anchor="modification">
          <name>Modification Attack</name>
          <section anchor="overview">
            <name>Overview</name>
            <t>An on-path internal attacker can modify a packet while it is in transit in a way that directly affects the packet's segment list.</t>
            <t>A modification attack can be performed in one or more of the following ways:</t>
            <ul spacing="normal">
              <li>
                <t>SID list: the SRH can be manipulated by adding or removing SIDs, or by modifying existing SIDs.</t>
              </li>
              <li>
                <t>IPv6 Destination Address (DA): when an SRH is present, modifying the destination address (DA) of the IPv6 header affects the active segment. However, DA modification can affect the SR policy even in the absence of an SRH. One example is modifying a DA which is used as a Binding SID <xref target="RFC8402"/>. Another example is modifying a DA which represents a compressed segment list <xref target="RFC9800"/>. SRH compression allows encoding multiple compressed SIDs within a single 128-bit SID, and thus modifying the DA can affect one or more hops in the SR policy.</t>
              </li>
              <li>
                <t>Add/remove SRH: an attacker can insert or remove an SRH.</t>
              </li>
              <li>
                <t>SRH TLV: adding, removing or modifying TLV fields in the SRH.</t>
              </li>
            </ul>
            <t>The SR modification attack is performed by an on-path attacker who has access to packets in transit and can implement these attacks directly. SR modification is relatively easy to implement and requires low processing resources. However, it facilitates more complex on-path attacks by redirecting traffic to another node that the attacker has access to with more processing resources.</t>
            <t>An on-path internal attacker can also modify, insert, or delete other extension headers but these are outside the scope of this document.</t>
          </section>
          <section anchor="scope">
            <name>Scope</name>
            <t>An SR modification attack can be performed by on-path attackers. If filtering is deployed at the domain boundaries as described in <xref target="filtering"/>, the ability to implement SR modification attacks is limited to on-path internal attackers.</t>
          </section>
          <section anchor="mod-effect">
            <name>Effect</name>
            <t>SR modification attacks, including adding or removing an SRH, modifying the SID list, and modifying the IPv6 DA, can have one or more of the following outcomes, which are described in <xref target="sec-effect"/>.</t>
            <ul spacing="normal">
              <li>
                <t>Unauthorized access</t>
              </li>
              <li>
                <t>Avoiding a specific node or path</t>
              </li>
              <li>
                <t>Preferring a specific path</t>
              </li>
              <li>
                <t>Causing header modifications</t>
              </li>
              <li>
                <t>Causing packets to be discarded</t>
              </li>
              <li>
                <t>Resource exhaustion</t>
              </li>
              <li>
                <t>Forwarding loops</t>
              </li>
            </ul>
            <t>Maliciously adding unnecessary TLV fields can cause further resource exhaustion.</t>
          </section>
        </section>
        <section anchor="passive-listening">
          <name>Passive Listening</name>
          <section anchor="overview-1">
            <name>Overview</name>
            <t>An on-path internal attacker can passively listen to packets and specifically listen to the SRv6-related information that is conveyed in the IPv6 header and the SRH. This approach can be used for reconnaissance, i.e., for collecting segment lists.</t>
          </section>
          <section anchor="scope-1">
            <name>Scope</name>
            <t>A reconnaissance attack is limited to on-path internal attackers.</t>
            <t>If filtering is deployed at the domain boundaries (<xref target="filtering"/>), it prevents any leaks of explicit SRv6 routing information through the boundaries of the administrative domain. In this case, external attackers can only collect SRv6-related data in a malfunctioning network in which SRv6-related information is leaked through the boundaries of an SR domain.</t>
          </section>
          <section anchor="effect">
            <name>Effect</name>
            <t>While the information collected in a reconnaissance attack does not compromise the confidentiality of the user data, it allows an attacker to gather information about the network which in turn can be used to enable other attacks.</t>
            <t>Passive eavesdropping can also impact end‑user privacy. Observable SRH fields (e.g., the Segment List and SRH TLVs) may enable correlation of flows and tracking of users, endpoints, or services.</t>
          </section>
        </section>
        <section anchor="packet-insertion-and-replaying">
          <name>Packet Insertion and Replaying</name>
          <section anchor="overview-2">
            <name>Overview</name>
            <t>In a packet insertion attack packets are inserted (injected) into the network with a segment list. The attack can be applied either by using synthetic packets or by replaying previously recorded packets.</t>
          </section>
          <section anchor="scope-2">
            <name>Scope</name>
            <t>Packet insertion can be performed by either on-path or off-path attackers. In the case of a replay attack, recording packets in-flight requires on-path access and the recorded packets can later be injected either from an on-path or an off-path location.</t>
            <t>If filtering is deployed at the domain boundaries (<xref target="filtering"/>), insertion attacks can only be implemented by internal attackers.</t>
          </section>
          <section anchor="effect-1">
            <name>Effect</name>
            <t>The main effect of this attack is resource exhaustion, which compromises the availability of the network, as described in <xref target="mod-effect"/>.</t>
          </section>
        </section>
        <section anchor="other-attacks">
          <name>Other Attacks</name>
          <t>Various attacks which are not specific to SRv6 can be used to compromise networks that deploy SRv6. For example, spoofing is not specific to SRv6, but can be used in a network that uses SRv6. Such attacks are outside the scope of this document.</t>
          <t>Because SRv6 is completely reliant on IPv6 for addressing, forwarding, and fundamental networking basics, it is potentially subject to any existing or emerging IPv6 vulnerabilities <xref target="RFC9099"/>. This, however, is out of scope for this document.</t>
        </section>
      </section>
      <section anchor="control-plane-attacks">
        <name>Control Plane Attacks</name>
        <section anchor="overview-3">
          <name>Overview</name>
          <t>The SRv6 control plane leverages existing control plane protocols, such as BGP, IS-IS, OSPF and PCEP. Consequently, any security attacks that can potentially compromise these protocols are also applicable to SRv6 deployments utilizing them. Therefore, this document does not provide an exhaustive list of the potential control plane attacks. Instead, it highlights key categories of attacks, focusing on three primary areas: attacks targeting routing protocols, centralized control plane infrastructures, and OAM protocols. In this document, the term OAM refers specifically to Operations, Administration, and Maintenance, in alignment with the definition provided in <xref target="RFC6291"/>. As such, it explicitly excludes management-related functions. Security considerations pertaining to the management plane are addressed in <xref target="mgmt"/>.</t>
        </section>
        <section anchor="routing-protocol-attacks">
          <name>Routing Protocol Attacks</name>
          <section anchor="overview-4">
            <name>Overview</name>
            <t>Generic threats applicable to routing protocols are discussed in <xref target="RFC4593"/>. Similar to data plane attacks, the abstractions outlined in <xref target="abstractions"/> are also applicable to control plane traffic. These include passive eavesdropping, message injection, replay, deletion, and modification.</t>
            <t>Passive listening enables an attacker to intercept routing protocol messages as they traverse the network. This form of attack does not alter the content of the messages but allows the adversary to analyze routing information, infer network topology, and gather intelligence on routing behavior.</t>
            <t>Active attacks involve the unauthorized injection or alteration of control plane messages. Such attacks can compromise routing integrity by introducing falsified information, modifying legitimate routing data, or triggering incorrect forwarding decisions. These disruptions may result in denial-of-service conditions or traffic misdirection.</t>
            <t>For example, an attacker may advertise falsified SIDs to manipulate SR policies. Another example in the context of SRv6 is the advertisement of an incorrect Maximum SID Depth (MSD) value <xref target="RFC8476"/>. If the advertised MSD is lower than the actual capability, path computation may fail to compute a viable path. Conversely, if the value is higher than supported, an attempt to instantiate a path that cannot be supported by the head-end (the node performing the SID imposition) may occur.</t>
            <t>An additional case could be the manipulation of backup paths <xref target="RFC8355"/>, where the attacker could alter the SIDs defining such backup path then directing traffic over suboptimal or compromised paths, enabling eavesdropping, traffic analysis, or selective denial of service, compromising the service integrity and confidentiality if traffic is diverted to unauthorized nodes or paths.</t>
            <t>Finally, in situations of interworking with other domains, as for BGP Egress Peer Engineering (BGP-EPE) <xref target="RFC9087"/> an attacker injecting malicious BGP-EPE policies may steer traffic through unauthorized peers or paths. This facilitates interception, traffic analysis, or denial of service. Attackers gaining access to the BGP-EPE controller can manipulate SRv6 route selection and segment lists, compromising network integrity and confidentiality.</t>
          </section>
          <section anchor="scope-3">
            <name>Scope</name>
            <t>The location of an attacker in the network significantly affects the scope of potential attacks. Off-path attackers are generally limited to injecting malicious routing messages, while on-path attackers can perform a broader range of attacks, including active modification, or passive listening.</t>
          </section>
          <section anchor="effect-2">
            <name>Effect</name>
            <t>Attacks targeting the routing protocol can have diverse impacts on network operation, including the aspects described in <xref target="sec-effect"/>. These impacts may include incorrect SR policies or the degradation of network availability, potentially resulting in service disruption or denial of service.</t>
          </section>
        </section>
        <section anchor="oam-attacks">
          <name>OAM Attacks</name>
          <section anchor="overview-5">
            <name>Overview</name>
            <t>Since SRv6 operates over an IPv6 infrastructure, existing OAM protocols designed for IPv6 networks are applicable to SRv6 as well. Consequently, the security considerations associated with conventional IPv6 OAM protocols are also relevant to SRv6 environments. As noted in <xref target="RFC7276"/>, successful attacks on OAM protocols can mislead operators by simulating non-existent failures or by concealing actual network issues. SRv6-specific OAM aspects are specified in <xref target="RFC9259"/>.</t>
            <t>The O-flag in the SRH serves as a marking bit in user packets to trigger telemetry data collection and export at the segment endpoints. An attacker may exploit this mechanism by setting the O-flag in transit packets, thereby overloading the control plane and degrading system availability. Additionally, an on-path attacker may passively intercept OAM data exported to external analyzers, potentially gaining unauthorized insight into network topology and behavior.</t>
          </section>
          <section anchor="scope-4">
            <name>Scope</name>
            <t>Off-path attackers may attempt to degrade system availability by injecting fabricated OAM messages or SRv6 packets with the O-bit set, thereby triggering unnecessary telemetry processing. They may also probe SRv6 nodes to infer information about network state and performance characteristics.</t>
            <t>On-path attackers possess enhanced capabilities due to their position within the traffic path. These include passive interception of OAM data, unauthorized modification of the O-bit in transit packets, and tampering with legitimate OAM messages to mislead network monitoring systems or conceal operational issues.</t>
          </section>
          <section anchor="effect-3">
            <name>Effect</name>
            <t>Attacks targeting OAM protocols may impact network availability or facilitate unauthorized information gathering. Such attacks can disrupt normal operations or expose sensitive details about network topology, performance, or state.</t>
          </section>
        </section>
        <section anchor="central-control-plane-attacks">
          <name>Central Control Plane Attacks</name>
          <section anchor="overview-6">
            <name>Overview</name>
            <t>Centralized control plane architectures, such as those based on the Path Computation Element (PCE) <xref target="RFC4655"/> and PCE as a Central Controller (PCECC) <xref target="RFC8283"/>, inherently introduce a single point of failure. This centralization may present a security vulnerability, particularly with respect to denial-of-service (DoS) attacks targeting the controller. Furthermore, the central controller becomes a focal point for potential interception or manipulation of control messages exchanged with individual Network Elements (NEs), thereby increasing the risk of compromise to the overall network control infrastructure.</t>
          </section>
          <section anchor="scope-5">
            <name>Scope</name>
            <t>As with other control plane attacks, an off-path attacker may attempt to inject forged control messages or impersonate a legitimate controller. On-path attackers, by virtue of their position within the communication path, possess additional capabilities such as passive interception of control traffic and in-transit modification of messages exchanged between the controller and Network Elements (NEs).</t>
            <t>For example, an attacker may manipulate SR policies instantiated via the central controller (using protocols like PCEP or BGP) at the head end, thereby altering both the paths of the SR policy and the traffic steered over it. Additionally, PCECC enables manipulation of SID allocation and distribution.</t>
          </section>
          <section anchor="effect-4">
            <name>Effect</name>
            <t>A successful attack may result in any of the adverse effects described in <xref target="sec-effect"/>, potentially impacting availability and operational correctness.</t>
          </section>
        </section>
      </section>
      <section anchor="mgmt">
        <name>Management Plane Attacks</name>
        <section anchor="overview-7">
          <name>Overview</name>
          <t>Similar to the control plane, a compromised management plane can enable a broad range of attacks, including unauthorized manipulation of SR policies and disruption of network availability. The specific threats and their potential impact are influenced by the management protocols in use.</t>
          <t>As with centralized control systems, a centralized management infrastructure may introduce a single point of failure, rendering it susceptible to denial-of-service (DoS) attacks or making it a target for eavesdropping and message tampering.</t>
          <t>Unauthorized access in a network management system can enable attackers or unprivileged users to gain control over network devices and alter configurations. In SRv6-enabled environments, this can result in the manipulation of segment routing policies or cause denial-of-service (DoS) conditions by disrupting traffic or tampering with forwarding behavior.</t>
          <t>Management functionality is often defined using YANG data models, such as those specified in <xref target="RFC9020"/>, <xref target="I-D.ietf-lsr-isis-srv6-yang"/> and <xref target="I-D.ietf-lsr-ospf-srv6-yang"/>. As with any YANG module, data nodes marked as writable, creatable, or deletable may be considered sensitive in certain operational environments. Unauthorized or unprotected write operations (e.g., via edit-config) targeting these nodes can adversely affect network operations. Some of the readable data nodes in a YANG module may also be considered sensitive or vulnerable in some network environments.</t>
          <section anchor="scope-6">
            <name>Scope</name>
            <t>As with control plane attacks, an off-path attacker may attempt to inject forged management messages or impersonate a legitimate network management system. On-path attackers, due to their privileged position within the communication path, have additional capabilities such as passive interception of management traffic and unauthorized modification of messages in transit. An attacker with unauthorized access to a management system can cause significant damage, depending on the scope of the system and the strength of the access control mechanisms in place.</t>
          </section>
          <section anchor="effect-5">
            <name>Effect</name>
            <t>A successful attack may result in any of the adverse effects described in <xref target="sec-effect"/>, potentially impacting availability and operational correctness.</t>
          </section>
        </section>
      </section>
      <section anchor="attacks-summary">
        <name>Attacks - Summary</name>
        <t>The following table summarizes the attacks that were described in the previous subsections, and the corresponding effect of each of the attacks. Details about the effect are described in <xref target="sec-effect"/>.</t>
        <figure anchor="summary-table">
          <name>Summary of Attacks</name>
          <artwork><![CDATA[
+=============+==================+===================================+
| Attack      | Details          | Effect                            |
+=============+==================+===================================+
|Modification |Modification of:  |* Unauthorized access              |
|             |* SID list        |* Avoiding a specific node or path |
|             |* IPv6 DA         |* Preferring a specific path       |
|             |Add/remove/modify:|* Causing header modifications     |
|             |* SRH             |* Causing packets to be discarded  |
|             |* SRH TLV         |* Resource exhaustion              |
|             |                  |* Forwarding loops                 |
+-------------+------------------+-----------------------------------+
|Passive      |Passively listen  |* Reconnaissance                   |
|listening    |to SRv6-related   |                                   |
|             |information       |                                   |
+-------------+------------------+-----------------------------------+
|Packet       |Maliciously inject|* Resource exhaustion              |
|insertion    |packets with a    |* Security tooling confusion       |
|             |segment list      |                                   |
+-------------+------------------+-----------------------------------+
|Control plane|* Routing protocol|                                   |
|attacks      |  attacks         |                                   |
|             |* OAM attacks     |                                   |
|             |* Central control |                                   |
|             |  plane attacks   |* Unauthorized access              |
|             |                  |* Avoiding a specific node or path |
|             |                  |* Preferring a specific path       |
+-------------+------------------+* Causing header modifications     |
|Management   |* Centralized     |* Causing packets to be discarded  |
|plane attacks|  management      |* Resource exhaustion              |
|             |  attacks         |* Forwarding loops                 |
|             |* Unauthorized    |                                   |
|             |  access to the   |                                   |
|             |  management      |                                   |
|             |  system          |                                   |
+-------------+------------------+-----------------------------------+

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="mitigations">
      <name>Mitigation Methods</name>
      <t>This section presents methods for mitigating the threats and issues that were presented in previous sections. This section does not introduce new security solutions or protocols.</t>
      <section anchor="filtering">
        <name>Trusted Domains and Filtering</name>
        <section anchor="overview-8">
          <name>Overview</name>
          <t>As specified in <xref target="RFC8402"/>:</t>
          <artwork><![CDATA[
   By default, SR operates within a trusted domain.  Traffic MUST be
   filtered at the domain boundaries.

   The use of best practices to reduce the risk of tampering within the
   trusted domain is important.  Such practices are discussed in
   [RFC4381] and are applicable to both SR-MPLS and SRv6.
]]></artwork>
          <t>Following the direction of <xref target="RFC8402"/>, and as discussed in <xref target="threat"/>, the current document assumes that SRv6 is a trusted domain and that the traffic is filtered at the domain boundaries. Filtering at SR
ingress nodes is intended to mitigate modification and insertion attacks, while filtering at SR egress nodes is intended to mitigate outbound leaks. Thus, most of the attacks described in this document are limited to within the domain (i.e., internal attackers).</t>
          <t>It should be noted that relying on perfectly crafted filters on all edges of the trusted domain poses a demonstrable risk of inbound or outbound leaks if the filters are removed or adjusted erroneously. It is also important to note that some filtering implementations have limits on the size, complexity, or protocol support that can be applied, which may prevent the filter adjustments or creation required to properly secure the trusted domain for a new protocol such as SRv6. Such an approach is commonly referred to as "fail-open", which inherently contains more risk than fail-closed methodologies.</t>
          <t>Practically speaking, this means successfully enforcing a "Trusted Domain" may be operationally difficult and error-prone in practice, and that attacks that are expected to be unfeasible from outside the trusted domain may actually become feasible when any of the involved systems fails to enforce the filtering policy that is required to define the Trusted Domain.</t>
        </section>
        <section anchor="srh-filtering">
          <name>SRH Filtering</name>
          <t>Filtering can be performed based on the presence of an SRH. More generally, <xref target="RFC9288"/> provides recommendations on the filtering of IPv6 packets containing IPv6 extension headers at transit routers. However, filtering based on the presence of an SRH is not necessarily useful for two reasons:</t>
          <ol spacing="normal" type="1"><li>
              <t>The SRH is optional for SID processing as described in <xref target="RFC8754"/> section 3.1 and 4.1.</t>
            </li>
            <li>
              <t>A packet containing an SRH may not be destined to the SR domain, as it may be simply transiting the domain. Therefore, filtering solely based on the presence of an SRH, at either SR ingress or SR egress, is not necessarily recommended. Instead, this scenario is mitigated by encapsulating packets on the domain boundary, as discussed in <xref target="encap"/>. While inter-SR-domain scenarios are a violation of the trust model described above, the operational practices recommended here aim to preserve interoperability and avoid blanket behaviors that would break SR when adjacent networks follow different practices.</t>
            </li>
          </ol>
          <t>For these reasons SRH filtering is not necessarily a useful method of mitigation.</t>
        </section>
        <section anchor="address-range-filtering">
          <name>Address Range Filtering</name>
          <t>The IPv6 destination address can be filtered at the external interface of the SR ingress node of the SRv6 domain and at all nodes implementing SRv6 SIDs within the SR domain in order to mitigate external attacks. Section 5.1 of <xref target="RFC8754"/> describes this in detail and a summary is presented here:</t>
          <ol spacing="normal" type="1"><li>
              <t>At ingress nodes, any packet entering the SR domain and destined to a SID within the SR domain is dropped.</t>
            </li>
            <li>
              <t>At every SRv6 enabled node, any packet destined to a SID instantiated at the node from a source address outside the SR domain is dropped.</t>
            </li>
          </ol>
          <t>In order to apply such a filtering mechanism the SR domain needs to have an infrastructure address range for SIDs and an infrastructure address range for source addresses that can be detected and enforced. This practice helps prevent the use of SRH and SID information to track individual users or reveal communication patterns outside the trusted domain. Some examples of an infrastructure address range for SIDs are:</t>
          <ul spacing="normal">
            <li>
              <t>The prefix defined in <xref target="RFC9602"/></t>
            </li>
            <li>
              <t>ULA addresses</t>
            </li>
            <li>
              <t>GUA addresses</t>
            </li>
          </ul>
          <t>As stated in the security considerations section of <xref target="RFC9602"/>, the usage of the prefix allocated by <xref target="RFC9602"/> improves security by making it more simple to filter traffic at the edge of the SR Domains. It is important to note that <xref target="RFC9602"/> allocates and makes a dedicated prefix available for SRv6 SIDs for use inside a trusted SRv6 domain. Use of other prefixes for this purpose will result in further security considerations such as potential SID pool route leakage or more complicated filtering requirements, increasing the likelihood of human or configuration error.</t>
          <t>Many operators reserve a /64 block for all loopback addresses and allocate /128 for each loopback interface. This simplifies the filtering of permitted source addresses.</t>
          <t>Failure to implement address range filtering at ingress nodes is mitigated with filtering at SRv6 enabled nodes. Failure to implement both filtering mechanisms could result in a "fail open" scenario, where some attacks by internal attackers described in this document may be launched by external attackers.</t>
          <t>Filtering on prefixes has been shown to be useful, specifically <xref target="RFC8754"/>'s description of packet filtering. There are no known limitations with filtering on infrastructure addresses, and <xref target="RFC9099"/> expands on the concept with control plane filtering.</t>
        </section>
      </section>
      <section anchor="encap">
        <name>Encapsulation of Packets</name>
        <t>Packets steered within an SR domain are typically encapsulated using IPv6. Encapsulation at the SR ingress node, followed by decapsulation at the SR egress node and forwarding of the inner packet without lookup, provides two key benefits:</t>
        <ul spacing="normal">
          <li>
            <t>Mitigates external attacker capabilities against the domain</t>
          </li>
          <li>
            <t>Supports encapsulation of both IPv4 and IPv6 packets</t>
          </li>
        </ul>
        <t>Practices outlined in Section 5 of <xref target="RFC8754"/> should be followed to ensure exclusivity of use for any prefix configured within the trusted domain.</t>
      </section>
      <section anchor="hmac">
        <name>Hashed Message Authentication Code (HMAC)</name>
        <t>The integrity of the SRH can be protected by an HMAC TLV, as defined in <xref target="RFC8754"/>. The HMAC is an optional TLV that secures the segment list, the SRH flags, the SRH Last Entry field and the IPv6 source address. A pre-shared key is used in the generation and verification of the HMAC.</t>
        <t>Using an HMAC in an SR domain can mitigate some of the SR Modification Attacks (<xref target="modification"/>).</t>
        <t>The following aspects of the HMAC should be considered:</t>
        <ul spacing="normal">
          <li>
            <t>The HMAC TLV is optional <xref target="RFC8754"/>.</t>
          </li>
          <li>
            <t>While it is presumed that unique keys will be employed by each participating node, manual configuration of pre-shared keys may lead to key reuse. In such scenarios, the same key might be reused by multiple nodes of an SRv6 domain as an incorrect shortcut to keep pre-shared key configuration manageable. This key should not be the same key for different trusted domains, including those existing on the same node.</t>
          </li>
          <li>
            <t>When the HMAC is used there is a distinction between an attacker who becomes internal by having physical access, for example by plugging into an active port of a network device, and an attacker who has full access to a legitimate network node, including for example encryption keys if the network is encrypted. The latter type of attacker is an internal attacker who can perform any of the attacks that were described in the previous section as relevant to internal attackers.</t>
          </li>
          <li>
            <t>For the lifetime of the pre-shared key validity, an internal attacker who does not have access to the pre-shared key can capture legitimate packets, and later replay the SRH and HMAC from these recorded packets. This allows the attacker to insert the previously recorded SRH and HMAC into a newly injected packet. An on-path internal attacker can also replace the SRH of an in-transit packet with a different SRH that was previously captured.</t>
          </li>
          <li>
            <t>In cases where an SRH carries policy semantics, care should be taken to understand the implications of malformed SRH, invalid TLVs, and authentication failures.</t>
          </li>
        </ul>
        <t>These considerations limit the extent to which HMAC TLV can be relied upon as a security mechanism that could readily mitigate threats associated with spoofing and tampering protection for the IPv6 SRH.</t>
      </section>
      <section anchor="control-plane-mitigation-methods">
        <name>Control Plane Mitigation Methods</name>
        <t>Mitigation strategies for control plane attacks depend heavily on the specific protocols in use. Since these protocols are not exclusive to SRv6, this section does not attempt to provide an exhaustive list of mitigation techniques. Instead, it is focused on considerations particularly relevant to SRv6 deployments.</t>
        <t>Routing protocols can employ authentication and/or encryption to protect against modification, injection, and replay attacks, as outlined in <xref target="RFC6518"/>. These mechanisms are essential for maintaining the integrity and authenticity of control plane communications.</t>
        <t>In centralized SRv6 control plane architectures, such as those described in <xref target="I-D.ietf-pce-segment-routing-policy-cp"/>, it is recommended that communication between PCEs and PCCs be secured using authenticated and encrypted sessions. This is typically achieved using Transport Layer Security (TLS), following the guidance in <xref target="RFC8253"/> and best practices in <xref target="RFC9325"/>.</t>
        <t>When the O-flag is used for Operations, Administration, and Maintenance (OAM) functions, as defined in <xref target="RFC9259"/>, implementations should enforce rate limiting to mitigate potential denial-of-service (DoS) attacks triggered by excessive control plane signaling. Furthermore, if the HMAC TLV is used, it provides integrity protection of the O-flag as described in <xref target="hmac"/>.</t>
        <t>The control plane should be confined to a trusted administrative domain. As specified in <xref target="I-D.ietf-idr-bgp-ls-sr-policy"/>, SR Policy information advertised via BGP should be restricted to authorized nodes, controllers, and applications within this domain. Similarly, the use of the O-flag is assumed to occur only within such a trusted environment, where the risk of abuse is minimized.</t>
      </section>
      <section anchor="management-plane-mitigation-methods">
        <name>Management Plane Mitigation Methods</name>
        <t>Mitigating attacks on the management plane, much like in the control plane, depends on the specific protocols and interfaces employed.</t>
        <t>Management protocols such as NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/> are commonly used to configure and monitor SRv6-enabled devices. These protocols must be secured to prevent unauthorized access, configuration tampering, or information leakage.</t>
        <t>The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
        <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a pre-configured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
        <t>SRv6-specific YANG modules should be designed with the same security considerations applied to all YANG-based models. Writable nodes must be protected using access control mechanisms such as NACM and secured transport protocols like SSH or TLS to prevent unauthorized configuration changes. Readable nodes that expose sensitive operational data should be access-controlled and transmitted only over encrypted channels to mitigate the risk of information leakage.</t>
      </section>
      <section anchor="mitigations-summary">
        <name>Mitigations - Summary</name>
        <t>The following table summarizes the possible mitigation methods for each of the attacks that were described in the previous section.</t>
        <figure anchor="mitigation-table">
          <name>Summary of Mitigation Methods for each of the Attacks</name>
          <artwork><![CDATA[
+===============================+====================================+
| Attacks                       | Mitigation Methods                 |
+===============================+====================================+
| Modification attack (6.2.1)   | Trusted domains and filtering (7.1)|
|                               | Encapsulation of packets (7.2)     |
|                               | HMAC (7.3)                         |
+-------------------------------+------------------------------------+
| Passive listening (6.2.2)     | Trusted domains and filtering (7.1)|
|                               | Encapsulation of packets (7.2)     |
+-------------------------------+------------------------------------+
| Packet insertion and          | Trusted domains and filtering (7.1)|
| replaying (6.2.3)             | Encapsulation of packets (7.2)     |
|                               | HMAC (7.3)                         |
+-------------------------------+------------------------------------+
| Control plane attacks (6.3)   | Control plane mitigations (7.4)    |
+-------------------------------+------------------------------------+
| Management plane attacks (6.4)| Management plane mitigations (7.5) |
+-------------------------------+------------------------------------+

]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="operational-and-filtering-considerations">
      <name>Operational and Filtering Considerations</name>
      <section anchor="middle-box-filtering-issues">
        <name>Middle Box Filtering Issues</name>
        <t>When an SRv6 packet is forwarded in the SRv6 domain, its IPv6 destination address is modified in each segment and the final destination address is not available in the IPv6 header. Security devices on SRv6 networks may not learn the real destination address and incorrectly perform access control on some SRv6 traffic.</t>
        <t>The security devices on SRv6 networks need to take care of SRv6 packets. However, SRv6 packets are often encapsulated by an SR ingress device with an IPv6 encapsulation that has the loopback address of the SR ingress device as a source address. As a result, the address information of SR packets may be asymmetric, resulting in improper traffic filter problems, which affects the effectiveness of security devices.
For example, along the forwarding path in SRv6 network, the SR-aware firewall will check the association relationships of the bidirectional VPN traffic packets. It is therefore able to retrieve the final destination of an SRv6 packet from the last entry in the SRH. When the &lt;source, destination&gt; tuple of the packet from PE1 (Provider Edge 1) to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;, the source address and destination address of the forward and backward traffic are regarded as different flows. Thus, legitimate traffic may be blocked by the firewall. Consistent with Section 3.5.2.4 of <xref target="RFC9288"/>, operators should avoid dropping packets that carry the SRH (Routing Type 4) within an SR domain and instead deploy filtering policies at transit routers that preserve SRv6 forwarding semantics.</t>
        <t>Forwarding SRv6 traffic through devices that are not SRv6-aware might in some cases lead to unpredictable behavior. Security appliances, monitoring systems, and middle boxes could react in different ways if they lack support for SRv6 mechanisms, such as the Segment Routing Header (SRH) <xref target="RFC8754"/>. Additionally, implementation limitations in the processing of IPv6 packets with extension headers may result in SRv6 packets being dropped <xref target="RFC7872"/>,<xref target="RFC9098"/>.</t>
        <t>Upper-layer checksum calculations rely on a pseudo-header that includes the IPv6 Destination Address. <xref target="RFC8200"/> specifies that when the Routing header is present the upper-layer checksum is computed by the originating node based on the IPv6 address of the last element of the Routing header.  When compressed segment lists <xref target="RFC9800"/> are used, the last element of the Routing header may be different than the Destination Address as received by the final destination. Furthermore, compressed segment lists can be used in the Destination Address without the presence of a Routing header, and in this case the IPv6 Destination address can be modified along the path. As defined in <xref target="RFC9800"/>, the Destination Address used in the upper-layer checksum calculation is the address as expected to be received by the ultimate destination. As a result, some existing middleboxes which verify the upper-layer checksum might miscalculate the checksum.</t>
      </section>
      <section anchor="limited-capability-hardware">
        <name>Limited capability hardware</name>
        <t>In some cases, access-control list (ACL) capacity is a scarce and potentially shared hardware resource (e.g., TCAM/ACL tables). Depending on the scale of the network, SRH filtering can consume a non‑trivial portion of these resources. Since filtering resources can be shared with other features across a given hardware platform, filtering capabilities should be considered along with other hardware reliant functions such as VLAN scale, route table size, MAC address table size, etc. Filtering both at the control and data plane may or may not require shared resources. For example, some platforms may require allocating resources from route table size in order to accommodate larger numbers of access lists. Hardware and software configurations should be considered when designing the filtering capabilities for an SRv6 control and data plane.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of SRv6 are presented throughout this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9020">
          <front>
            <title>YANG Data Model for Segment Routing</title>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="P. Sarkar" initials="P." surname="Sarkar"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines three YANG data models. The first is for Segment Routing (SR) configuration and operation, which is to be augmented by different Segment Routing data planes. The next is a YANG data model that defines a collection of generic types and groupings for SR. The third module defines the configuration and operational states for the Segment Routing MPLS data plane.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9020"/>
          <seriesInfo name="DOI" value="10.17487/RFC9020"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9491">
          <front>
            <title>Integration of the Network Service Header (NSH) and Segment Routing for Service Function Chaining (SFC)</title>
            <author fullname="J. Guichard" initials="J." role="editor" surname="Guichard"/>
            <author fullname="J. Tantsura" initials="J." role="editor" surname="Tantsura"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document describes the integration of the Network Service Header (NSH) and Segment Routing (SR), as well as encapsulation details, to efficiently support Service Function Chaining (SFC) while maintaining separation of the service and transport planes as originally intended by the SFC architecture.</t>
              <t>Combining these technologies allows SR to be used for steering packets between Service Function Forwarders (SFFs) along a given Service Function Path (SFP), whereas the NSH is responsible for maintaining the integrity of the service plane, the SFC instance context, and any associated metadata.</t>
              <t>This integration demonstrates that the NSH and SR can work cooperatively and provide a network operator with the flexibility to use whichever transport technology makes sense in specific areas of their network infrastructure while still maintaining an end-to-end service plane using the NSH.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9491"/>
          <seriesInfo name="DOI" value="10.17487/RFC9491"/>
        </reference>
        <reference anchor="RFC9524">
          <front>
            <title>Segment Routing Replication for Multipoint Service Delivery</title>
            <author fullname="D. Voyer" initials="D." role="editor" surname="Voyer"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="R. Parekh" initials="R." surname="Parekh"/>
            <author fullname="H. Bidgoli" initials="H." surname="Bidgoli"/>
            <author fullname="Z. Zhang" initials="Z." surname="Zhang"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>This document describes the Segment Routing Replication segment for multipoint service delivery. A Replication segment allows a packet to be replicated from a replication node to downstream nodes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9524"/>
          <seriesInfo name="DOI" value="10.17487/RFC9524"/>
        </reference>
        <reference anchor="RFC9800">
          <front>
            <title>Compressed SRv6 Segment List Encoding</title>
            <author fullname="W. Cheng" initials="W." role="editor" surname="Cheng"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="F. Clad" initials="F." role="editor" surname="Clad"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>Segment Routing over IPv6 (SRv6) is the instantiation of Segment Routing (SR) on the IPv6 data plane. This document specifies new flavors for the SRv6 endpoint behaviors defined in RFC 8986, which enable the compression of an SRv6 segment list. Such compression significantly reduces the size of the SRv6 encapsulation needed to steer packets over long segment lists.</t>
              <t>This document updates RFC 8754 by allowing a Segment List entry in the Segment Routing Header (SRH) to be either an IPv6 address, as specified in RFC 8754, or a REPLACE-CSID container in packed format, as specified in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9800"/>
          <seriesInfo name="DOI" value="10.17487/RFC9800"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC4593">
          <front>
            <title>Generic Threats to Routing Protocols</title>
            <author fullname="A. Barbir" initials="A." surname="Barbir"/>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <author fullname="Y. Yang" initials="Y." surname="Yang"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>Routing protocols are subject to attacks that can harm individual users or network operations as a whole. This document provides a description and a summary of generic threats that affect routing protocols in general. This work describes threats, including threat sources and capabilities, threat actions, and threat consequences, as well as a breakdown of routing functions that might be attacked separately. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4593"/>
          <seriesInfo name="DOI" value="10.17487/RFC4593"/>
        </reference>
        <reference anchor="RFC4655">
          <front>
            <title>A Path Computation Element (PCE)-Based Architecture</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
            <author fullname="J. Ash" initials="J." surname="Ash"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
              <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4655"/>
          <seriesInfo name="DOI" value="10.17487/RFC4655"/>
        </reference>
        <reference anchor="RFC6518">
          <front>
            <title>Keying and Authentication for Routing Protocols (KARP) Design Guidelines</title>
            <author fullname="G. Lebovitz" initials="G." surname="Lebovitz"/>
            <author fullname="M. Bhatia" initials="M." surname="Bhatia"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document is one of a series concerned with defining a roadmap of protocol specification work for the use of modern cryptographic mechanisms and algorithms for message authentication in routing protocols. In particular, it defines the framework for a key management protocol that may be used to create and manage session keys for message authentication and integrity. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6518"/>
          <seriesInfo name="DOI" value="10.17487/RFC6518"/>
        </reference>
        <reference anchor="RFC6242">
          <front>
            <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
            <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6242"/>
          <seriesInfo name="DOI" value="10.17487/RFC6242"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="A. Hacker" initials="A." surname="Hacker"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9416">
          <front>
            <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="I. Arce" initials="I." surname="Arce"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="9416"/>
          <seriesInfo name="DOI" value="10.17487/RFC9416"/>
        </reference>
        <reference anchor="RFC7872">
          <front>
            <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs. The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time. This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7872"/>
          <seriesInfo name="DOI" value="10.17487/RFC7872"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t>This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="RFC8476">
          <front>
            <title>Signaling Maximum SID Depth (MSD) Using OSPF</title>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <author fullname="U. Chunduri" initials="U." surname="Chunduri"/>
            <author fullname="S. Aldrin" initials="S." surname="Aldrin"/>
            <author fullname="P. Psenak" initials="P." surname="Psenak"/>
            <date month="December" year="2018"/>
            <abstract>
              <t>This document defines a way for an Open Shortest Path First (OSPF) router to advertise multiple types of supported Maximum SID Depths (MSDs) at node and/or link granularity. Such advertisements allow entities (e.g., centralized controllers) to determine whether a particular Segment Identifier (SID) stack can be supported in a given network. This document only refers to the Signaling MSD as defined in RFC 8491, but it defines an encoding that can support other MSD types. Here, the term "OSPF" means both OSPFv2 and OSPFv3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8476"/>
          <seriesInfo name="DOI" value="10.17487/RFC8476"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC9098">
          <front>
            <title>Operational Implications of IPv6 Packets with Extension Headers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="N. Hilliard" initials="N." surname="Hilliard"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document summarizes the operational implications of IPv6 extension headers specified in the IPv6 protocol specification (RFC 8200) and attempts to analyze reasons why packets with IPv6 extension headers are often dropped in the public Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9098"/>
          <seriesInfo name="DOI" value="10.17487/RFC9098"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC9259">
          <front>
            <title>Operations, Administration, and Maintenance (OAM) in Segment Routing over IPv6 (SRv6)</title>
            <author fullname="Z. Ali" initials="Z." surname="Ali"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes how the existing IPv6 mechanisms for ping and traceroute can be used in a Segment Routing over IPv6 (SRv6) network. The document also specifies the OAM flag (O-flag) in the Segment Routing Header (SRH) for performing controllable and predictable flow sampling from segment endpoints. In addition, the document describes how a centralized monitoring system performs a path continuity check between any nodes within an SRv6 domain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9259"/>
          <seriesInfo name="DOI" value="10.17487/RFC9259"/>
        </reference>
        <reference anchor="RFC9288">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document analyzes the security implications of IPv6 Extension Headers and associated IPv6 options. Additionally, it discusses the operational and interoperability implications of discarding packets based on the IPv6 Extension Headers and IPv6 options they contain. Finally, it provides advice on the filtering of such IPv6 packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9288"/>
          <seriesInfo name="DOI" value="10.17487/RFC9288"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC7835">
          <front>
            <title>Locator/ID Separation Protocol (LISP) Threat Analysis</title>
            <author fullname="D. Saucez" initials="D." surname="Saucez"/>
            <author fullname="L. Iannone" initials="L." surname="Iannone"/>
            <author fullname="O. Bonaventure" initials="O." surname="Bonaventure"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document provides a threat analysis of the Locator/ID Separation Protocol (LISP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7835"/>
          <seriesInfo name="DOI" value="10.17487/RFC7835"/>
        </reference>
        <reference anchor="RFC9050">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Procedures and Extensions for Using the PCE as a Central Controller (PCECC) of LSPs</title>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="S. Peng" initials="S." surname="Peng"/>
            <author fullname="M. Negi" initials="M." surname="Negi"/>
            <author fullname="Q. Zhao" initials="Q." surname="Zhao"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software-Defined Networking (SDN) systems.</t>
              <t>A PCE as a Central Controller (PCECC) can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it. Thus, the Label Switched Path (LSP) can be calculated/set up/initiated and the label-forwarding entries can also be downloaded through a centralized PCE server to each network device along the path while leveraging the existing PCE technologies as much as possible.</t>
              <t>This document specifies the procedures and Path Computation Element Communication Protocol (PCEP) extensions for using the PCE as the central controller for provisioning labels along the path of the static LSP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9050"/>
          <seriesInfo name="DOI" value="10.17487/RFC9050"/>
        </reference>
        <reference anchor="RFC9602">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Segment Identifiers in the IPv6 Addressing Architecture</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="October" year="2024"/>
            <abstract>
              <t>Segment Routing over IPv6 (SRv6) uses IPv6 as the underlying data plane. Thus, Segment Identifiers (SIDs) used by SRv6 can resemble IPv6 addresses and behave like them while exhibiting slightly different behaviors in some situations. This document explores the characteristics of SRv6 SIDs and focuses on the relationship of SRv6 SIDs to the IPv6 Addressing Architecture. This document allocates and makes a dedicated prefix available for SRv6 SIDs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9602"/>
          <seriesInfo name="DOI" value="10.17487/RFC9602"/>
        </reference>
        <reference anchor="RFC9087">
          <front>
            <title>Segment Routing Centralized BGP Egress Peer Engineering</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
            <author fullname="E. Aries" initials="E." surname="Aries"/>
            <author fullname="D. Afanasiev" initials="D." surname="Afanasiev"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Segment Routing (SR) leverages source routing. A node steers a packet through a controlled set of instructions, called segments, by prepending the packet with an SR header. A segment can represent any instruction, topological or service based. SR allows for the enforcement of a flow through any topological path while maintaining per-flow state only at the ingress node of the SR domain.</t>
              <t>The Segment Routing architecture can be directly applied to the MPLS data plane with no change on the forwarding plane. It requires a minor extension to the existing link-state routing protocols.</t>
              <t>This document illustrates the application of Segment Routing to solve the BGP Egress Peer Engineering (BGP-EPE) requirement. The SR-based BGP-EPE solution allows a centralized (Software-Defined Networking, or SDN) controller to program any egress peer policy at ingress border routers or at hosts within the domain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9087"/>
          <seriesInfo name="DOI" value="10.17487/RFC9087"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="RFC8355">
          <front>
            <title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8355"/>
          <seriesInfo name="DOI" value="10.17487/RFC8355"/>
        </reference>
        <reference anchor="RFC4381">
          <front>
            <title>Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document analyses the security of the BGP/MPLS IP virtual private network (VPN) architecture that is described in RFC 4364, for the benefit of service providers and VPN users.</t>
              <t>The analysis shows that BGP/MPLS IP VPN networks can be as secure as traditional layer-2 VPN services using Asynchronous Transfer Mode (ATM) or Frame Relay. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4381"/>
          <seriesInfo name="DOI" value="10.17487/RFC4381"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="I-D.ietf-lsr-ospf-srv6-yang">
          <front>
            <title>YANG Data Model for OSPF SRv6</title>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Syed Kamran Raza" initials="S. K." surname="Raza">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Acee Lindem" initials="A." surname="Lindem">
              <organization>LabN Consulting, L.L.C.</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model that can be used to configure
   and manage OSPFv3 Segment Routing over the IPv6 Data Plane.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-ospf-srv6-yang-09"/>
        </reference>
        <reference anchor="I-D.ietf-lsr-isis-srv6-yang">
          <front>
            <title>YANG Data Model for IS-IS SRv6</title>
            <author fullname="Zhibo Hu" initials="Z." surname="Hu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Ye" initials="D." surname="Ye">
              <organization>Cisco</organization>
            </author>
            <author fullname="Yingzhen Qu" initials="Y." surname="Qu">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model that can be used to configure
   and manage IS-IS Segment Routing over the IPv6 Data Plane.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lsr-isis-srv6-yang-09"/>
        </reference>
        <reference anchor="I-D.ietf-pce-segment-routing-policy-cp">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Segment Routing (SR) Policy Candidate Paths</title>
            <author fullname="Mike Koldychev" initials="M." surname="Koldychev">
              <organization>Ciena Corporation</organization>
            </author>
            <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan">
              <organization>Ciena Corporation</organization>
            </author>
            <author fullname="Samuel Sidor" initials="S." surname="Sidor">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Colby Barth" initials="C." surname="Barth">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Shuping Peng" initials="S." surname="Peng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Hooman Bidgoli" initials="H." surname="Bidgoli">
              <organization>Nokia</organization>
            </author>
            <date day="4" month="April" year="2025"/>
            <abstract>
              <t>   A Segment Routing (SR) Policy is an ordered list of instructions,
   called "segments" that represent a source-routed policy.  Packet
   flows are steered into an SR Policy on a node where it is
   instantiated.  An SR Policy is made of one or more candidate paths.

   This document specifies the Path Computation Element Communication
   Protocol (PCEP) extension to signal candidate paths of an SR Policy.
   Additionally, this document updates RFC 8231 to allow delegation and
   setup of an SR Label Switched Path (LSP), without using the path
   computation request and reply messages.  This document is applicable
   to both Segment Routing over MPLS (SR-MPLS) and Segment Routing over
   IPv6 (SRv6).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-pce-segment-routing-policy-cp-27"/>
        </reference>
        <reference anchor="I-D.ietf-idr-bgp-ls-sr-policy">
          <front>
            <title>Advertisement of Segment Routing Policies using BGP Link-State</title>
            <author fullname="Stefano Previdi" initials="S." surname="Previdi">
              <organization>Individual</organization>
            </author>
            <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Jie Dong" initials="J." surname="Dong">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Hannes Gredler" initials="H." surname="Gredler">
              <organization>RtBrick Inc.</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="6" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a mechanism to collect the Segment Routing
   Policy information that is locally available in a node and advertise
   it into BGP Link-State (BGP-LS) updates.  Such information can be
   used by external components for path computation, re-optimization,
   service placement, network visualization, etc.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-ls-sr-policy-17"/>
        </reference>
        <reference anchor="ITU-Sec">
          <front>
            <title>ITU-T M.3016.1, Security for the management plane: Security requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="CanSecWest2007" target="https://airbus-seclab.github.io/ipv6/IPv6_RH_security-csw07.pdf">
          <front>
            <title>IPv6 Routing Header Security</title>
            <author>
              <organization/>
            </author>
            <date year="2007"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 597?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge the valuable input and contributions from Zafar Ali, Andrew Alston, Dale Carder, Bruno Decraene, Dhruv Dhody, Mike Dopheide, Darren Dukes, Linda Dunbar, Joel Halpern, Boris Hassanov, Tom Hill, Suresh Krishnan, Sam Oehlert, Alvaro Retana, Eric Vyncke, and Russ White.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
