<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bdmgct-spring-srv6-security-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="SRv6 Security Considerations">SRv6 Security Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-bdmgct-spring-srv6-security-01"/>
    <author initials="N." surname="Buraglio" fullname="Nick Buraglio">
      <organization>Energy Sciences Network</organization>
      <address>
        <email>buraglio@forwardingplane.net</email>
      </address>
    </author>
    <author initials="T." surname="Mizrahi" fullname="Tal Mizrahi">
      <organization>Huawei</organization>
      <address>
        <email>tal.mizrahi.phd@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="L. M." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="03"/>
    <area>Routing</area>
    <workgroup>Source Packet Routing in Networking</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>SRv6 is a traffic engineering, encapsulation and steering mechanism utilizing IPv6 addresses to identify segments in a pre-defined policy. This document discusses security considerations in SRv6 networks, including the potential threats and the possible mitigation methods. The document does not define any new security protocols or extensions to existing protocols.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://buraglio.github.io/draft-bdmgct-spring-srv6-security/draft-bdmgct-spring-srv6-security.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bdmgct-spring-srv6-security/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Packet Routing in Networking Working Group mailing list (<eref target="mailto:spring@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spring/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spring/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/buraglio/draft-bdmgct-spring-srv6-security"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Segment Routing (SR) <xref target="RFC8402"/> utilizing an IPv6 data plane is a source routing model that leverages an IPv6 underlay
and an IPv6 extension header called the Segment Routing Header (SRH) to signal and control the forwarding and path of packets by imposing an ordered list of
path details that are processed at each hop along the signaled path. Because SRv6 is fundamentally bound to the IPv6 protocol, and because of the reliance of a
new header there are security considerations which must be noted or addressed in order to operate an SRv6 network in a reliable and secure manner.
Specifically, some of the main properties of SRv6 that affect the security considerations are:</t>
      <ul spacing="normal">
        <li>
          <t>SRv6 makes use of the SRH which is a new type of Routing Extension
Header.  Some of the security considerations of the SRH are discussed in <xref target="RFC5095"/> and
<xref target="RFC8754"/>.</t>
        </li>
        <li>
          <t>SRv6 consists of using the SRH on the IPv6 dataplane, and therefore
known security considerations of IPv6 <xref target="RFC9099"/> are applicable to SRv6 as well.</t>
        </li>
        <li>
          <t>While SRv6 uses what appear to be typical IPv6 addresses, the address space is processed differently by segment endpoints.
A typical IPv6 unicast address is comprised of a network prefix, host identifier, and a subnet mask.
A typical SRv6 segment identifier (SID) is broken into a locator, a function identifier, and optionally, function arguments.
The locator must be routable, which enables both SRv6 capable and incapable devices to participate in forwarding, either as normal IPv6 unicast or SRv6.
The capability to operate in environments that may have gaps in SRv6 support allows the bridging of islands of SRv6 devices with standard IPv6 unicast routing.</t>
        </li>
      </ul>
      <t>This document describes various threats to SRv6 networks and also presents existing approaches to avoid or mitigate the threats.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SID: Segment Identifier <xref target="RFC8402"/></t>
          </li>
          <li>
            <t>SRH: Segment Routing Header <xref target="RFC8754"/></t>
          </li>
          <li>
            <t>SRv6: Segment Routing over IPv6 <xref target="RFC8402"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="threat">
      <name>Threat Model</name>
      <t>This section introduces the threat model that is used in this document. The model is based on terminology from the Internet threat model <xref target="RFC3552"/>, as well as some concepts from <xref target="RFC9055"/> and <xref target="RFC7384"/>. Details regarding inter-domain segment routing (SR) are out of scope for this document.</t>
      <section anchor="security-components">
        <name>Security Components</name>
        <t>The main components of information security are confidentiality, integrity and availability, often referred to by the acronym CIA. A short description of each of these components is presented below in the context of SRv6 security.</t>
        <section anchor="confidentiality">
          <name>Confidentiality</name>
          <t>The purpose of confidentiality is to protect the user data from being exposed to unauthorized users, i.e., preventing attackers from eavesdropping to user data. The confidentiality of user data is outside the scope of this document. However, confidentiality aspects of SRv6-related information are within the scope; collecting information about SR endpoint addresses, SR policies, and network topologies, is a specific form of reconnaissance, which is further discussed in <xref target="recon"/>.</t>
        </section>
        <section anchor="integrity">
          <name>Integrity</name>
          <t>Preventing information from being modified is a key property of information security. Other aspects of integrity include authentication, which is the ability to verify the source of information, and authorization, which enforces different permission policies to different users or sources. In the context of SRv6, compromising the integrity may result in packets being routed in different paths than they were intended to be routed through, which may have various implications, as further discussed in  <xref target="attacks"/>.</t>
        </section>
        <section anchor="availability">
          <name>Availability</name>
          <t>Protecting the availability of a system means keeping the system running continuously without disruptions. The availability aspects of SRv6 include the ability of attackers to leverage SRv6 as a means for compromising the performance of a network or for causing Denial of Service (DoS).</t>
        </section>
      </section>
      <section anchor="threat-abstractions">
        <name>Threat Abstractions</name>
        <t>A security attack is implemented by performing a set of one or more basic operations. These basic operations (abstractions) are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Passive listening: an attacker who reads packets off the network can collect information about SR endpoint addresses, SR policies and the network topology. This information can then be used to deploy other types of attacks.</t>
          </li>
          <li>
            <t>Packet replaying: in a replay attack the attacker records one or more packets and transmits them at a later point in time.</t>
          </li>
          <li>
            <t>Packet insertion: an attacker generates and injects a packet to the network. The generated packet may be maliciously crafted to include false information, including for example false addresses and SRv6-related information.</t>
          </li>
          <li>
            <t>Packet deletion: by intercepting and removing packets from the network, an attacker prevents these packets from reaching their destination. Selective removal of packets may, in some cases, cause more severe damage than random packet loss.</t>
          </li>
          <li>
            <t>Packet modification: the attacker modifies packets during transit.</t>
          </li>
        </ul>
      </section>
      <section anchor="threat-taxonomy">
        <name>Threat Taxonomy</name>
        <t>The threat terminology used in this document is based on <xref target="RFC3552"/>. Threats are classified according to two main criteria: internal vs. external attackers, and on-path vs. off-path attackers, as discussed in <xref target="RFC9055"/>.</t>
        <dl>
          <dt>Internal vs. External:</dt>
          <dd>
            <t>An internal attacker in the context of SRv6 is an attacker who is located within an SR domain. Specifically, an internal attacker either has access to a node in the SR domain, or is located on an internal path between two nodes in the SR domain. In this context, the latter means that the attacker can be reached from a node in the SR domain without traversing an SR egress node, and can reach a node in the SR domain without traversing an SR ingress node. External attackers, on the other hand, are not within the SR domain.</t>
          </dd>
          <dt>On-path vs. Off-path:</dt>
          <dd>
            <t>On-path attackers are located in a position that allows interception, modification or dropping of in-flight packets, as well as insertion (generation) of packets. Off-path attackers can only attack by insertion of packets.</t>
          </dd>
        </dl>
        <t>The following figure depicts the attacker types according to the taxonomy above. As illustrated in the figure, on-path attackers are located along the path of the traffic that is under attack, and therefore can listen, insert, delete, modify or replay packets in transit. Off-path attackers can insert packets, and in some cases can passively listen to some of the traffic, such as multicast transmissions.</t>
        <figure anchor="threat-figure">
          <name>Threat Model Taxonomy</name>
          <artwork><![CDATA[
     on-path         on-path        off-path      off-path
     external        internal       internal      external
     attacker        attacker       attacker      attacker
       |                   |        |__            |
       |     SR      __    | __   _/|  \           |
       |     domain /  \_/ |   \_/  v   \__        v
       |            \      |        X      \       X
       v            /      v                \
 ----->X---------->O------>X------->O------->O---->
                   ^\               ^       /^
                   | \___/\_    /\_ | _/\__/ |
                   |        \__/    |        |
                   |                |        |
                  SR               SR        SR
                  ingress        endpoint    egress
                  node                       node
]]></artwork>
        </figure>
        <t>In the current threat model the SR domain defines the boundary that distinguishes internal from external threats. As specified in <xref target="RFC8402"/>:</t>
        <artwork><![CDATA[
   By default, SR operates within a trusted domain.  Traffic MUST be
   filtered at the domain boundaries.
   The use of best practices to reduce the risk of tampering within the
   trusted domain is important.  Such practices are discussed in
   [RFC4381] and are applicable to both SR-MPLS and SRv6.
]]></artwork>
        <t>In the context of the current document it is assumed that SRv6 is deployed within a limited domain <xref target="RFC8799"/> with filtering at the domain boundaries, forming a trusted domain with respect to SRv6. Thus, external attackers are outside of the trusted domain. Specifically, an attack on one domain that is invoked from within a different domain is considered an external attack in the context of the current document.</t>
        <t>Following the spirit of <xref target="RFC8402"/>, the current document  mandates a filtering mechanism that eliminates the threats from external attackers. This approach limits the scope of the attacks described in this document to within the domain (i.e., internal attackers).</t>
        <t>It should be noted that in some threat models the distinction between internal and external attackers depends on whether an attacker has access to a cryptographically secured (encrypted or authenticated) domain. Specifically, in some of these models there is a distinction between an attacker who becomes internal by having physical access, for example by plugging into an active port of a network device, and an attacker who has full access to a legitimate network node, including for example encryption keys if the network is encrypted. The current model does not distinguish between these two types of attackers and there is no assumption about whether the SR domain is cryptographically secured or not.</t>
      </section>
    </section>
    <section anchor="attacks">
      <name>Attacks</name>
      <section anchor="sr-modification-attack">
        <name>SR Modification Attack</name>
        <section anchor="overview">
          <name>Overview</name>
          <t>An attacker can modify a packet while it is in transit in a way that directly affects the packet's SR policy. The modification can affect the destination address of the IPv6 header and/or the SRH. In this context SRH modification may refer to inserting an SRH, removing an SRH, or modifying some of the fields of an existing SRH.</t>
          <t>Modification of an existing SRH can be further classified into several possible attacks. Specifically, the attack can include adding one or more SIDs to the segment list, removing one or more SIDs or replacing some of the SIDs with differnet SIDs. Another possible type of modification is by adding, removing or modifying TLV fields in the SRH.</t>
          <t>When an SRH is present modifying the destination address (DA) of the IPv6 header affects the active segment. However, DA modification can affect the SR policy even in the absence of an SRH. One example is modifying a DA which is used as a Binding SID <xref target="RFC8402"/>. Another example is modifying a DA which represents a compressed segment list <xref target="I-D.ietf-spring-srv6-srh-compression"/>. SRH compression allows to encode multiple compressed SIDs within a single 128-bit SID, and thus modifying the DA can affect one or more hops in the SR policy.</t>
        </section>
        <section anchor="scope">
          <name>Scope</name>
          <t>An SR modification attack can be performed by on-path attackers. As discussed in <xref target="threat"/>, it assumed that filtering is deployed at the domain boundaries, thus limiting the ability of implementing SR modification attacks to on-path internal attackers.</t>
        </section>
        <section anchor="mod-impact">
          <name>Impact</name>
          <t>The SR modification attack allows an attacker to change the SR policy that the packet is steered through and thus to manipulate the path and the processing that the packet is subject to.</t>
          <t>Specifically, the SR modification attack can impact the network and the forwarding behavior of packets in one or more of the following ways:</t>
          <dl>
            <dt>Avoiding a specific node or path:</dt>
            <dd>
              <t>An attacker can manipulate the DA and/or SRH in order to avoid a specific node or path. This approach can be used, for example, for bypassing the billing service or avoiding access controls and security filters.</t>
            </dd>
            <dt>Preferring a specific path:</dt>
            <dd>
              <t>The packet can be manipulated to avert packets to a specific path. This attack can result in allowing various unauthorized services such as traffic acceleration. Alternatively, an attacker can avert traffic to be forwarded through a specific node that the attacker has access to, thus facilitating more complex on-path attacks such as passive listening, recon and various man-in-the-middle attacks. It is noted that the SR modification attack is performed by an on-path attacker who has access to packets in transit, and thus can implement these attacks directly. However, SR modification is relatively easy to implement and requires low processing resources by an attacker, while it facilitates more complex on-path attacks by averting the traffic to another node that the attacker has access to and has more processing resources.</t>
            </dd>
            <dt>Forwarding through a path that causes the packet to be discarded:</dt>
            <dd>
              <t>SR modification may casue a packet to be forwarded to a point in the network where it can no longer be forwarded, causing the packet to be discarded.</t>
            </dd>
            <dt>Manipulating the SRv6 network programming:</dt>
            <dd>
              <t>An attacker can trigger a specific endpoint behavior by modifying the destination address and/or SIDs in the segment list. This attack can be invoked in order to manipulate the path or in order to exhaust the resources of the SR endpoint.</t>
            </dd>
            <dt>Availability:</dt>
            <dd>
              <t>An attacker can add SIDs to the segment list in order to increase the number hops that each packet is forwarded through and thus increase the load on the network. For example, a set of SIDs can be inserted in a way that creates a forwarding loop (<xref target="RFC8402"/>, <xref target="RFC5095"/>) and thus loads the nodes along the loop. Network programming can be used in some cases to manipulate segment endpoints to perform unnecessary functions that consume processing resources. Path inflation, malicious looping and unnecessary instructions have a common outcome, resource exhaustion, which may in severe cases cause Denial of Service (DoS).</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="recon">
        <name>Reconnaissance</name>
        <section anchor="overview-1">
          <name>Overview</name>
          <t>An on-path attacker can passively listen to packets and specifically to the SRv6-related information that is conveyed in the IPv6 header and the SRH. This approach can be used for collecting information about SIDs and policies, and thus to facilitate mapping the structure of the network and its potential vulnerabilities.</t>
        </section>
        <section anchor="scope-1">
          <name>Scope</name>
          <t>A recon attack is limited to on-path internal attackers.</t>
          <t>It is assumed that the SRv6 domain is filtered in a way that prevents any leaks of explicit SRv6 routing information through the boundaries of the administrative domain. External attackers can only collect SRv6-related data in a malfunctioning network in which SRv6-related information is leaked through the boundaries of an SR domain.</t>
        </section>
        <section anchor="impact">
          <name>Impact</name>
          <t>While the information collected in a recon attack does not compromise the confidentiality of the user data, it allows an attacker to gather information about the network which in turn can be used to enable other attacks.</t>
        </section>
      </section>
      <section anchor="packet-insertion">
        <name>Packet Insertion</name>
        <section anchor="overview-2">
          <name>Overview</name>
          <t>In this attack packets are inserted (injected) into the network with a segment list that defines a specific SR policy. The attack can be applied either by using synthetic packets or by replaying previously recorded packets.</t>
        </section>
        <section anchor="scope-2">
          <name>Scope</name>
          <t>Packet insertion can be performed by internal attackers, either on-path or off-path. In the case of a replay attack, recording packets in-flight requires on-path access and the recorded packets can later be injected either from an on-path or an off-path location.</t>
          <t>SRv6 domains are assumed to be filtered in a way that mitigates insertion attacks from external attackers.</t>
        </section>
        <section anchor="impact-1">
          <name>Impact</name>
          <t>The main impact of this attack is resource exhaustion which compromises the availability of the network, as described in <xref target="mod-impact"/>.</t>
        </section>
      </section>
      <section anchor="control-and-management-plane-attacks">
        <name>Control and Management Plane Attacks</name>
        <section anchor="overview-3">
          <name>Overview</name>
          <t>Depending on the control plane protocols used in a network, it is possible to use the control plane as a way of compromising the network. For example, an attacker can advertise SIDs in order to manipulate the SR policies used in the network. A wide range of attacks can be implemented, including injecting control plane messages, selectively removing legitimate messages, replaying them or passively listening to them.</t>
          <t>A compromised management plane can also facilitate a wide range of attacks, including manipulating the SR policies or compromising the network availability.</t>
        </section>
        <section anchor="scope-3">
          <name>Scope</name>
          <t>Control plane attacks can be performed by internal attackers. Injection can be performed by off-path attackers, while removal, replaying and listening require on-path access. The scope of management attacks depends on the specific management protocol and architecture.</t>
          <t>It is assumed that SRv6 domain boundary filtering is used for mitigating potential control plane and management plane attacks from external attackers. Segment routing does not define any specific security mechanisms in existing control plane or management plane protocols. However, existing control plane and management plane protocols use authentication and security mechanisms to validate the authenticity of information.</t>
        </section>
        <section anchor="impact-2">
          <name>Impact</name>
          <t>A compromised control plane or management plane can impact the network in various possible ways. SR policies can be manipulated by the attacker to avoid specific paths or to prefer specific paths, as described in <xref target="mod-impact"/>. Alternatively, the attacker can compromise the availability, either by defining SR policies that load the network resources, as described in <xref target="mod-impact"/>, or by blackholing some or all of the SR policies. A passive attacker can use the control plane or management plane messages as a means for recon, in a similar manner to <xref target="mod-impact"/>.</t>
        </section>
      </section>
      <section anchor="other-attacks">
        <name>Other Attacks</name>
        <t>Various attacks which are not specific to SRv6 can be used to compromise networks that deploy SRv6. For example, spoofing is not specific to SRv6, but can be used in a network that uses SRv6. Such attacks are outside the scope of this document.</t>
        <t>Because SRv6 is completely reliant on IPv6 for addressing, forwarding, and fundamental networking basics, it is potentially subject to any existing or emerging IPv6 vulnerabilities <xref target="RFC9099"/>, however, this is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="mitigation-methods">
      <name>Mitigation Methods</name>
      <t>This section presents methods that can be used to mitigate the threats and issues that were presented in previous sections. This section does not introduce new security solutions or protocols.</t>
      <section anchor="filtering">
        <name>Filtering</name>
        <section anchor="srh-filtering">
          <name>SRH Filtering</name>
          <t>SRv6 packets rely on the routing header in order to steer traffic that adheres to a defined SRv6 traffic policy. Thus, SRH filtering can be enforced at the ingress and egress nodes of the SR domain, so that packets with an SRH cannot be forwarded into the SR domain or out of the SR domain. Specifically, such filtering is performed by detecting Next Header 43 (Routing Header) with Routing Type 4 (SRH).</t>
          <t>Because of the methodologies used in SID compression <xref target="I-D.ietf-spring-srv6-srh-compression"/>, SRH compression does not necessarily use an SRH. In practice this means that when compressed segment lists are used without an SRH, filtering based on the Next Header is not relevant, and thus filtering can only be applied baed on the address range, as described below.</t>
        </section>
        <section anchor="address-range-filtering">
          <name>Address Range Filtering</name>
          <t>The IPv6 destination address can be filtered at the SR ingress node in order to mitigate external attacks. An ingress packet with a destination address that defines an active segment with an SR endpoint in the SR domain is filtered.</t>
          <t>In order to apply such a filtering mechanism the SR domain needs to have an allocated address range that can be detected and enforced by the SR ingress, for example by using LUA addresses.</t>
          <t>Note that the use of GUA addressing in data plane programming could result in an fail open scenario when appropriate border filtering is not implemented or supported.</t>
        </section>
      </section>
      <section anchor="encapsulation-of-packets">
        <name>Encapsulation of Packets</name>
        <t>Packets steered in an SR domain are often encapsulated in an IPv6 encapsulation. This mechanism allows for encapsulation of both IPv4 and IPv6 packets. Encapsulation of packets at the SR ingress node and decapsulation at the SR egress node mitigates the ability of external attackers to impact SR steering within the domain.</t>
      </section>
    </section>
    <section anchor="implications-on-existing-equipment">
      <name>Implications on Existing Equipment</name>
      <section anchor="limitations-in-filtering-capabilities">
        <name>Limitations in Filtering Capabilities</name>
        <t><xref target="RFC9288"/> provides recommendations on the filtering of IPv6 packets containing IPv6 extension headers at transit routers. SRv6 relies on the routing header (RH4). Because the technology is reasonably new, many platforms, routing and otherwise, do not posses the capability to filter and in some cases even provide logging for IPv6 next-header 43 Routing type 4.</t>
      </section>
      <section anchor="middlebox-filtering-issues">
        <name>Middlebox Filtering Issues</name>
        <t>When an SRv6 packet is forwarded in the SRv6 domain, its destination address changes constantly, the real destination address is hidden. Security devices on SRv6 network may not learn the real destination address and fail to take access control on some SRv6 traffic.</t>
        <t>The security devices on SRv6 networks need to take care of SRv6 packets. However, the SRv6 packets usually use loopback address of the PE device a as source address. As a result, the address information of SR packets may be asymmetric, resulting in improper filter traffic problems, which affects the effectiveness of security devices.
For example, along the forwarding path in SRv6 network, the SR-aware firewall will check the association relationships of the bidirectional VPN traffic packets. And it is able to retrieve the final destination of SRv6 packet from the last entry in the . When the &lt;source, destination&gt; tuple of the packet from PE1 to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;, the source address and destination address of the forward and backward VPN traffic are regarded as different flow. Eventually, the legal traffic may be blocked by the firewall.</t>
        <t>SRv6 is commonly used as a tunneling technology in operator networks. To provide VPN service in an SRv6 network, the ingress PE encapsulates the payload with an outer IPv6 header with the SRH carrying the SR Policy segment List along with the VPN service SID. The user traffic towards SRv6 provider backbone will be encapsulated in SRv6 tunnel. When constructing an SRv6 packet, the destination address field of the SRv6 packet changes constantly and the source address field of the SRv6 packet is usually assigned using an address on the originating device, which may be a host or a network element depending on configuration. This may affect the security equipment and middle boxes in the traffic path. Because of the existence of the SRH, and the additional headers, older security appliances, monitoring systems, and middle boxes cold react in different ways if they are unaware of the additional header and tunneling mechanisms leveraged by SRv6. This lack of awareness may be due to software limits, or in some cases as has been seen in other emerging technologies, may be due to limits in ASICs or NPUs that could silently drop or otherwise impede SRv6 packets.
<xref target="RFC6169"/></t>
      </section>
      <section anchor="emerging-technology-growing-pains">
        <name>Emerging technology growing pains</name>
      </section>
    </section>
    <section anchor="gap-analysis">
      <name>Gap Analysis</name>
      <t>This section analyzes the security related gaps with respect to the threats and issues that were discussed in the previous sections.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations of SRv6 are presented throughout this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="topics-for-further-consideration">
      <name>Topics for Further Consideration</name>
      <t>This section lists topics that will be discussed further before deciding whether they need to be included in this document, as well as some placeholders for items that need further work.</t>
      <ul spacing="normal">
        <li>
          <t>The following references may be used in the future: <xref target="RFC8986">RFC9256</xref></t>
        </li>
        <li>
          <t>SRH compression</t>
        </li>
        <li>
          <t>Spoofing</t>
        </li>
        <li>
          <t>Path enumeration</t>
        </li>
        <li>
          <t>Infrastructure and topology exposure: this seems like a non-issue from a WAN perspective. Needs more thought - could be problematic in a host to host scenario involving a WAN and/or a data center fabric.</t>
        </li>
        <li>
          <t>Terms that may be used in a future version: Locator Block, FRR, uSID</t>
        </li>
        <li>
          <t>L4 checksum: [RFC8200] specifies that when the Routing header is present the L4 checksum is computed by the originating node based on the IPv6 address of the last element of the Routing header.  When compressed segment lists <xref target="I-D.ietf-spring-srv6-srh-compression"/> are used, the last element of the Routing header may be different than the Destination Address as received by the final destination. Furthermore, compressed segment lists can be used in the Destination Address without the presence of a Routing header, and in this case the IPv6 Destination address can be modified along the path. As a result, some existing middleboxes which verify the L4 checksum might miscalculate the checksum. This issue is currently under discusison in the SPRING WG.</t>
        </li>
        <li>
          <t>Segment Routing Header figure: the SRv6 Segment Routing Header (SRH) is defined in <xref target="RFC8754"/>.</t>
        </li>
      </ul>
      <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    | Next Header   |  Hdr Ext Len  | Routing Type  | Segments Left |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |  Last Entry   |     Flags     |              Tag              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[0] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |                                                               |
                                  ...
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    |                                                               |
    |            Segment List[n] (128 bits IPv6 address)            |
    |                                                               |
    |                                                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC9256">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="A. Hacker" initials="A." surname="Hacker"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC7855">
          <front>
            <title>Source Packet Routing in Networking (SPRING) Problem Statement and Requirements</title>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="M. Horneffer" initials="M." surname="Horneffer"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>The ability for a node to specify a forwarding path, other than the normal shortest path, that a particular packet will traverse, benefits a number of network functions. Source-based routing mechanisms have previously been specified for network protocols but have not seen widespread adoption. In this context, the term "source" means "the point at which the explicit route is imposed"; therefore, it is not limited to the originator of the packet (i.e., the node imposing the explicit route may be the ingress node of an operator's network).</t>
              <t>This document outlines various use cases, with their requirements, that need to be taken into account by the Source Packet Routing in Networking (SPRING) architecture for unicast traffic. Multicast use cases and requirements are out of scope for this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7855"/>
          <seriesInfo name="DOI" value="10.17487/RFC7855"/>
        </reference>
        <reference anchor="RFC5095">
          <front>
            <title>Deprecation of Type 0 Routing Headers in IPv6</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <author fullname="G. Neville-Neil" initials="G." surname="Neville-Neil"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. This document updates the IPv6 specification to deprecate the use of IPv6 Type 0 Routing Headers, in light of this security concern. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5095"/>
          <seriesInfo name="DOI" value="10.17487/RFC5095"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4942">
          <front>
            <title>IPv6 Transition/Co-existence Security Considerations</title>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>The transition from a pure IPv4 network to a network where IPv4 and IPv6 coexist brings a number of extra security considerations that need to be taken into account when deploying IPv6 and operating the dual-protocol network and the associated transition mechanisms. This document attempts to give an overview of the various issues grouped into three categories:</t>
              <t>o issues due to the IPv6 protocol itself, o issues due to transition mechanisms, and o issues due to IPv6 deployment.</t>
              <t>This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4942"/>
          <seriesInfo name="DOI" value="10.17487/RFC4942"/>
        </reference>
        <reference anchor="RFC9288">
          <front>
            <title>Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document analyzes the security implications of IPv6 Extension Headers and associated IPv6 options. Additionally, it discusses the operational and interoperability implications of discarding packets based on the IPv6 Extension Headers and IPv6 options they contain. Finally, it provides advice on the filtering of such IPv6 packets at transit routers for traffic not directed to them, for those cases where such filtering is deemed as necessary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9288"/>
          <seriesInfo name="DOI" value="10.17487/RFC9288"/>
        </reference>
        <reference anchor="RFC9099">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC6169">
          <front>
            <title>Security Concerns with IP Tunneling</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>A number of security concerns with IP tunnels are documented in this memo. The intended audience of this document includes network administrators and future protocol developers. The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed and propose strategies for the mitigation of those issues. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6169"/>
          <seriesInfo name="DOI" value="10.17487/RFC6169"/>
        </reference>
        <reference anchor="I-D.ietf-spring-srv6-srh-compression">
          <front>
            <title>Compressed SRv6 Segment List Encoding</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Francois Clad" initials="F." surname="Clad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="29" month="February" year="2024"/>
            <abstract>
              <t>   Segment Routing over IPv6 (SRv6) is the instantiation of Segment
   Routing (SR) on the IPv6 dataplane.  This document specifies new
   flavors for the SR segment endpoint behaviors defined in RFC 8986,
   which enable the compression of an SRv6 segment list.  Such
   compression significantly reduces the size of the SRv6 encapsulation
   needed to steer packets over long segment lists.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-srh-compression-13"/>
        </reference>
        <reference anchor="IANAIPv6SPAR" target="https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml">
          <front>
            <title>IANA IPv6 Special-Purpose Address Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 385?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge the contributions from Andrew Alston, Dale Carder, Bruno Decraene, Joel Halpern, Alvaro Retana, and Eric Vyncke.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
