<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.40 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bdmgct-spring-srv6-security-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="SRv6 Security Considerations">SRv6 Security Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-bdmgct-spring-srv6-security-00"/>
    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Mizrahi" fullname="Tal Mizrahi">
      <organization>Huawei</organization>
      <address>
        <email>tal.mizrahi.phd@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2023" month="November" day="06"/>
    <area>Routing</area>
    <workgroup>Source Packet Routing in Networking</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>SRv6 is a traffic engineering, encapsulation, and steering mechanism utilizing IPv6 addresses to identify segments in a pre-defined policy. While SRv6 uses what appear to be typical IPv6 addresses, the address space is treated differently, and in most (all?) cases.</t>
      <t>A typical IPv6 unicast address is comprised of a network prefix, host identifier, and a subnet mask. A typical SRv6 segment identifier (SID) is broken into a locator, a function identifier, and optionally, function arguments. The locator must be routable, which enables both SRv6 capable and incapable devices to participate in forwarding, either as normal IPv6 unicast or SRv6. The capability to operate in environments that may have gaps in SRv6 support allows the bridging of islands of SRv6 devices with standard IPv6 unicast routing.</t>
      <t>As standard IPv6 addressing, there are security considerations that should be well understood that may not be obvious.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://buraglio.github.io/draft-bdmgct-spring-srv6-security/draft-bdmgct-spring-srv6-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bdmgct-spring-srv6-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Packet Routing in Networking Working Group mailing list (<eref target="mailto:spring@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spring/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spring/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing (SR) <xref target="RFC8402"/> utilizing an IPv6 data plane is a source routing model that leverages an IPv6 underlay
and an IPv6 extension header called the Segment Routing Header (SRH) to signal and control the forwarding and path of packets by imposing an ordered list of
path details that are processed at each hop along the signaled path. Because SRv6 is fundamentally bound to the IPv6 protocol, and because of the reliance of a
new header there are security considerations which must be noted or addressed in order to operate an SRv6 network in a reliable and secure manner.</t>
      <ul spacing="normal">
        <li>SRv6 makes use of the SRH which is a new type of Routing Extension
Header.  Therefore, the security properties of the Routing
Extension Header are addressed by the SRH.  See <xref target="RFC5095"/> and
<xref target="RFC8754"/> for details.</li>
        <li>SRv6 consists of using the SRH on the IPv6 dataplane which
security properties can be understood based on previous work
<xref target="RFC4301"/>, <xref target="RFC4302"/>, <xref target="RFC4303"/> and <xref target="RFC4942"/>.</li>
      </ul>
      <t>This document describes various threats to SRv6 networks and also
   presents existing approaches to avoid or mitigate the threats.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>SRv6
Locator Block
FRR
SID
uSID
SRH</t>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>This section introduces the threat model that is used in this document. The model is based on terminology from the Internet threat model <xref target="RFC3552"/>, as well as some concepts from <xref target="RFC9055"/> and <xref target="RFC7384"/>. Details regarding inter-domain segment routing (SR) are out of scope for this document.</t>
      <section anchor="security-components">
        <name>Security Components</name>
        <t>The main components of information security are confidentiality, integrity and availability, often referred to by the acronym CIA. A short description of each of these components is presented below in the context of SRv6 security.</t>
        <section anchor="confidentiality">
          <name>Confidentiality</name>
          <t>The purpose of confidentiality is to protect the user data from being exposed to unauthorized users, i.e., preventing attackers from eavesdropping to user data. The confidentiality of user data is outside the scope of this document. However, confidentiality aspects of SRv6-related information are within the scope; collecting information about SR endpoint addresses, SR policies, and network topologies, is a specific form of reconnaissance, which is further discussed in TBD.</t>
        </section>
        <section anchor="integrity">
          <name>Integrity</name>
          <t>Preventing information from being modified is a key property of information security. Other aspects of integrity include authentication, which is the ability to verify the source of information, and authorization, which enforces different permission policies to different users or sources. In the context of SRv6, compromising the integrity may result in packets being routed in different paths than they were intended to be routed through, which may have various implications, as further discussed in TBD.</t>
        </section>
        <section anchor="availability">
          <name>Availability</name>
          <t>Protecting the availability of a system means keeping the system running continuously without disruptions. The availability aspects of SRv6 include the ability of attackers to leverage SRv6 as a means for compromising the performance of a network or for causing Denial of Service (DoS).</t>
        </section>
      </section>
      <section anchor="threat-abstractions">
        <name>Threat Abstractions</name>
        <t>A security attack is implemented by performing a set of one or more basic operations. These basic operations (abstractions) are as follows:</t>
        <ul spacing="normal">
          <li>Passive listening: an attacker who reads packets off the network can collect information about SR endpoint addresses, SR policies and the network topology. This information can then be used to deploy other types of attacks.</li>
          <li>Packet replaying: in a replay attack the attacker records one or more packets and transmits them at a later point in time.</li>
          <li>Packet insertion: an attacker generates and injects a packet to the network. The generated packet may be maliciously crafted to include false information, including for example false addresses and SRv6-related information.</li>
          <li>Packet deletion: by intercepting and removing packets from the network, an attacker prevents these packets from reaching their destination. Selective removal of packets may, in some cases, cause more severe damage than random packet loss.</li>
          <li>Packet modification: the attacker modifies packets during transit.</li>
        </ul>
      </section>
      <section anchor="threat-taxonomy">
        <name>Threat Taxonomy</name>
        <t>The threat terminology used in this document is based on <xref target="RFC3552"/>. Threats are classified according to two main criteria: internal vs. external attackers, and on-path vs. off-path attackers, as discussed in <xref target="RFC9055"/>.</t>
        <dl>
          <dt>Internal vs. External:</dt>
          <dd>
            <t>An internal attacker in the context of SRv6 is an attacker who is located within an SR domain. Specifically, an internal attacker either has access to a node in the SR domain, or is located on an internal path between two nodes in the SR domain. In this context, the latter means that the attacker can be reached from a node in the SR domain without traversing an SR egress node, and can reach a node in the SR domain without traversing an SR ingress node. External attackers, on the other hand, are not within the SR domain.</t>
          </dd>
          <dt>On-path vs. Off-path:</dt>
          <dd>
            <t>On-path attackers are located in a position that allows interception, modification or dropping of in-flight packets, as well as insertion (generation) of packets. Off-path attackers can only attack by insertion of packets.</t>
          </dd>
        </dl>
        <t>The following figure depicts the attacker types according to the taxonomy above. As illustrated in the figure, on-path attackers are located along the path of the traffic that is under attack, and therefore can listen, insert, delete, modify or replay packets in transit. Off-path attackers can insert packets, and in some cases can passively listen to some of the traffic, such as multicast transmissions.</t>
        <figure anchor="threat-figure">
          <name>Threat Model Taxonomy</name>
          <artwork><![CDATA[
     on-path         on-path        off-path      off-path
     external        internal       internal      external
     attacker        attacker       attacker      attacker
       |                   |        |__            |
       |     SR      __    | __   _/|  \           |
       |     domain /  \_/ |   \_/  v   \__        v
       |            \      |        X      \       X
       v            /      v                \
 ----->X---------->O------>X------->O------->O---->
                   ^\               ^       /^
                   | \___/\_    /\_ | _/\__/ |
                   |        \__/    |        |
                   |                |        |
                  SR               SR        SR
                  ingress        endpoint    egress
                  node                       node
]]></artwork>
        </figure>
        <t>It should be noted that in some threat models the distinction between internal and external attackers depends on whether an attacker has access to a trusted or secured (encrypted or authenticated) domain. The current model defines the SR domain as the boundary that distinguishes internal from external threats, and does not make an assumption about whether the SR domain is secured or not. However, it can be assumed that the SR domain defines a trusted domain with respect to SRv6, and thus that external attackers are outside of this trusted domain.</t>
      </section>
    </section>
    <section anchor="security-considerations-in-operational-srv6-enabled-networks">
      <name>Security Considerations in Operational SRv6 Enabled Networks</name>
      <t><xref target="RFC9256"/> <xref target="RFC8986"/></t>
      <section anchor="encapsulation-of-packets">
        <name>Encapsulation of packets</name>
        <section anchor="allowing-potential-circumvention-of-existing-network-ingress-egress-policy">
          <name>Allowing potential circumvention of existing network ingress / egress policy.</name>
          <t>SRv6 packets rely on the routing header in order to steer traffic that adheres to a defined SRv6 traffic policy. This mechanism supports not only use of the IPv6 routing header for packet steering, it also allows for encapsulation of both IPv4 and IPv6 packets.</t>
          <t>IPv6 routing header</t>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Next Header   |  Hdr Ext Len  | Routing Type  | Segments Left |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Last Entry   |     Flags     |              Tag              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[0] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                                                               |
                                  ...
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[n] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="default-allow-failure-mode">
          <name>Default allow failure mode</name>
          <t>Use of GUA addressing in data plane programming could result in an fail open scenario when appropriate border filtering is not implemented or supported.</t>
        </section>
      </section>
      <section anchor="segment-routing-header">
        <name>Segment Routing Header</name>
        <t><xref target="RFC8754"/>
SRv6 routing header</t>
        <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Next Header   |  Hdr Ext Len  | Routing Type  | Segments Left |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Last Entry   |     Flags     |              Tag              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[0] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                                                               |
                                  ...
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[n] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The attacks can be lunched by constructing segment lists to define any traffic forwarding path. For example:
Attackers change the tail SID in Segment List to forward traffic to unexpected destinations;
Attackers delete the SID in Segment List to prevent packets from being processed, such as bypassing the billing service and security detection;
Attackers add the SID in Segment List to get various unauthorized services, such as traffic acceleration;
Broadband DoS/DDoS attacks:The attacks can be launched by constructing segment lists，such as inserting duplicate SRv6 address into segment lists,to make packets be forwarded repeatedly between two or more routers or hosts on specific links.<xref target="RFC5095"/>.Typically, the Segment List length of SRH is limited, but when SRv6 head compression technology is used, the number of package compression SIDs in SRH increases, and the amplification effect of traffic is more obvious.</t>
      </section>
      <section anchor="source-routing">
        <name>Source Routing</name>
        <t><xref target="RFC7855"/>
In SRv6 network, each network element along the message forwarding path has the opportunity to tamper with the SRv6 segment list.</t>
        <section anchor="source-routing-at-source-host">
          <name>Source Routing at source host</name>
          <t>Unlike SR-MPLS, SRv6 has a significantly more approachable host implementation.
Compared with SR-MPLS, SRv6 is easier to implement on the host side, and the threats are as follows:
1) The attacker generates SRv6 message by obtaining and stealing the identity and real SRH of real users to use unauthorized services.
2) In the process of transmitting SRv6 message from the user host to the operator network, SRH has also been tampered with, including interception/modification/falsification/abuse.</t>
        </section>
        <section anchor="source-routing-from-pcc-at-network-ingress">
          <name>Source Routing from PCC at network ingress</name>
          <t>Typically, the network operator joins the source routing at the header node of the SRv6 domain, and the source routing may also be tampered with by SRH in the SRv6 management domain.</t>
        </section>
        <section anchor="source-routing-across-network-management-domains">
          <name>Source routing across network management domains</name>
          <t>SRv6 is now typically deployed in only one network management domain and may be deployed in different network domains in the future. In particular, the network elements and threats that have really tampered with the list may be in different network management domains in Operational SRv6 Enabled Networks, causing threats that are difficult to trace.
As shown in the figure, suppose that when the network element 1 of SRv6 management domain 1 has tampered with the segment list, but the threat takes effect at SRv6 management domain 2. At this time, the threat generation and effective place are in different network management domains, and the management domain 2 cannot be traced back to the location where the tampering occurred.</t>
        </section>
      </section>
      <section anchor="locator-block">
        <name>Locator Block</name>
      </section>
      <section anchor="segment-identifiers">
        <name>Segment Identifiers</name>
        <section anchor="sid-compression">
          <name>SID Compression</name>
        </section>
        <section anchor="sid-spoofing">
          <name>SID spoofing</name>
        </section>
        <section anchor="snooping-and-packet-capture">
          <name>Snooping and Packet Capture</name>
        </section>
        <section anchor="spoofing">
          <name>Spoofing</name>
        </section>
        <section anchor="sid-lists-ipv6-addresses">
          <name>SID lists (IPv6 addresses)</name>
        </section>
        <section anchor="path-enumeration">
          <name>Path enumeration</name>
        </section>
        <section anchor="infrastructure-and-topology-exposure">
          <name>Infrastructure and topology exposure</name>
          <t>This seems like a non-issue from a WAN perspective. Needs more thought - could be problematic in a host to host scenario involving a WAN and/or a data center fabric.</t>
        </section>
      </section>
      <section anchor="limits-in-filtering-capabilities">
        <name>Limits in filtering capabilities</name>
      </section>
      <section anchor="exposure-of-internal-traffic-engineering-paths">
        <name>Exposure of internal Traffic Engineering paths</name>
        <t>Existing implementations may contain limited filtering capabilities necessary for proper isolation of the SRH from outside of an SRv6 domain.</t>
      </section>
      <section anchor="implications-on-security-devices">
        <name>Implications on Security Devices</name>
        <t>SRv6 is commonly used as a tunneling technology in operator networks.To provide VPN service in an SRv6 network, the ingress PE encapsulates the payload with an outer IPv6 header with the SRH carrying the SR Policy segment List along with the VPN service SID.The user traffic towards SRv6 provider backbone will be encapsulated in SRv6 tunnel. When constructing an SRv6 packet, the destination address field of the SRv6 packet changes constantly and the source address field of the SRv6 packet is usually assigned using loopback address (depending on configuration),which will affect the security equipments of the current network.</t>
        <section anchor="hidden-destination-address">
          <name>Hidden Destination Address</name>
          <t>When an SRv6 packet is forwarded in the SRv6 domain, its destination address changes constantly, the real destination address is hidden. Security devices on SRv6 network may not learn the real destination address and fail to take access control on some SRv6 traffic.</t>
        </section>
        <section anchor="improper-traffic-filtering">
          <name>Improper Traffic Filtering</name>
          <t>The security devices on SRv6 networks need to take care of SRv6 packets. However, the SRv6 packets usually use loopback address of the PE device a as source address. As a result, the address information of SR packets may be asymmetric, resulting in improper filter traffic problems, which affects the effectiveness of security devices.
For example, along the forwarding path in SRv6 network, the SR-aware firewall will check the association relationships of the bidirectional VPN traffic packets. And it is able to retrieve the final destination of SRv6 packet from the last entry in the SRH. When the &lt;source, destination&gt; tuple of the packet from PE1 to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;, the source address and destination address of the forward and backward VPN traffic are regarded as different flow. Eventually, the legal traffic may be blocked by the firewall.</t>
        </section>
      </section>
      <section anchor="emerging-technology-growing-pains">
        <name>Emerging technology growing pains</name>
      </section>
    </section>
    <section anchor="mitigation-methods">
      <name>Mitigation Methods</name>
      <t>This section presents methods that can be used to mitigate the threats and issues that were presented in previous sections. This section does not introduce new security solutions or protocols.</t>
    </section>
    <section anchor="gap-analysis">
      <name>Gap Analysis</name>
      <t>This section analyzes the security related gaps with respect to the threats and issues that were discussed in the previous sections.</t>
    </section>
    <section anchor="other-considerations">
      <name>Other considerations</name>
      <section anchor="existing-ipv6-vulnerabilities">
        <name>Existing IPv6 Vulnerabilities</name>
        <t><xref target="RFC8200"/></t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Example non-RFC link <xref target="IANAIPv6SPAR"/></t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="A. Hacker" initials="A." surname="Hacker"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC7855">
          <front>
            <title>Source Packet Routing in Networking (SPRING) Problem Statement and Requirements</title>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="M. Horneffer" initials="M." surname="Horneffer"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>The ability for a node to specify a forwarding path, other than the normal shortest path, that a particular packet will traverse, benefits a number of network functions. Source-based routing mechanisms have previously been specified for network protocols but have not seen widespread adoption. In this context, the term "source" means "the point at which the explicit route is imposed"; therefore, it is not limited to the originator of the packet (i.e., the node imposing the explicit route may be the ingress node of an operator's network).</t>
              <t>This document outlines various use cases, with their requirements, that need to be taken into account by the Source Packet Routing in Networking (SPRING) architecture for unicast traffic. Multicast use cases and requirements are out of scope for this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7855"/>
          <seriesInfo name="DOI" value="10.17487/RFC7855"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms. This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o issues due to the IPv6 protocol itself, o issues due to transition mechanisms, and o issues due to IPv6 deployment.</t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
        <reference anchor="IANAIPv6SPAR" target="https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml">
          <front>
            <title>IANA IPv6 Special-Purpose Address Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 342?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
