<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-rate-policy-discovery-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-rate-policy-discovery-02"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Amend" fullname="Markus Amend">
      <organization>Deutsche Telekom</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>markus.amend@telekom.de</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="16"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 99?>

<t>This document specifies mechanims for hosts to dynamically discover Network Rate-Limit Policies (NRLPs). This information is then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts (e.g., link MTU (RFC 4861) and PREFIX64 (RFC 8781)). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate NRLPs to hosts. For address family parity, a new DHCP option is also defined. The document also discusses how Provisioning Domains (PvD) can be used to notify hosts with NRLPs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 105?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>To optimally deliver connectivity services via a network attachment, networks advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
      <dl>
        <dt>Link Maximum Transmission Unit (MTU):</dt>
        <dd>
          <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
        </dd>
        <dt/>
        <dd>
          <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
        </dd>
        <dt/>
        <dd>
          <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
        </dd>
        <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
        <dd>
          <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
        </dd>
        <dt/>
        <dd>
          <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
        </dd>
      </dl>
      <t>Traffic exchanged over a network may be subject to rate-limit policies for various operational reasons. <xref target="I-D.brw-scone-throughput-advice-blob"/> specifies a generic object (called, Throughput Advice) that can be used by mechanims for hosts to dynamically discover these network rate-limit policies. This information can then passed to applications that might adjust their behaviors accordingly.</t>
      <t>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate rate-limit policies to hosts (<xref target="sec-nd"/>). The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Fate sharing</t>
        </li>
        <li>
          <t>Atomic configuration</t>
        </li>
        <li>
          <t>Updatability: change the policy at any time</t>
        </li>
        <li>
          <t>Deployability</t>
        </li>
      </ul>
      <t>For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4 in <xref target="sec-dhcp"/>. <xref target="sec-pvd"/> describes a discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>.</t>
      <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
      <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document. Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
      <t>Applications will have access to all available NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy. Likewise, a host with multiple network attachments may use the discovered NRLPs to decide how to distribute its flows over these network attachments (prefer a network attachment to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policies.</t>
      <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
      <t>To enhance flexibility in applying rate-limiting policies and better accommodate diverse endpoint performance requirements, mechanisms such as solicited Router Advertisements (RAs) <xref target="RFC8273"/> and endpoint-specific DHCP responses can be used. These unicast responses enable granular signaling of rate-limit policies to individual endpoints, facilitating differentiated rate-limit configurations. However, this document does not prescribe how resources should be partitioned within local networks, as such considerations fall outside its scope.</t>
      <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link. The reader may refer to I-D.brw-scone-manageability for a list of relevant mechanisms.</t>
      <t>Refer to <xref target="NRLP-WIRE"/> for configuration examples to use NRLP.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref target="I-D.brw-scone-throughput-advice-blob"/>.</t>
    </section>
    <section anchor="sec-common">
      <name>Common NLRP Parameters</name>
      <t>The following common fields are present in all NRLP options:</t>
      <section anchor="instance-flags-if">
        <name>Instance Flags (IF)</name>
        <t>The format of this 8-bit flags is shown in <xref target="opt-format-ff"/>. This field is used to express some generic properties of the advice.</t>
        <figure anchor="opt-format-ff">
          <name>Flow flags Field</name>
          <artwork align="center"><![CDATA[
 0 1 2 3 4 5 6 7
+-+-+-+-+-+-+-+-+
|U|U|U|R|R|D|D|S|
+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/> for the meaning of the R/D/S flags.</t>
        <t>U are unassigned bits. These bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
      </section>
      <section anchor="traffic-category-tc-throughput-parameters">
        <name>Traffic Category (TC) &amp; Throughput Parameters</name>
        <t>The following parameters are used:</t>
        <dl>
          <dt>TC:</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref section="5" sectionFormat="of" target="I-D.brw-scone-throughput-advice-blob"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a mandatory parameter.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-nd">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="sec-ndf">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    | Instance Flags|    TC         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-m-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="sec-dhcp">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Instance Flags |      TC       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-m-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
        </dl>
        <t>Refer to <xref target="sec-common"/> for the meaning of the other parameters.</t>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be used as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":0,
         "scope":0,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques discussed in the document offer the following security benefit: An OS can identify the type of application (background, foreground, streaming, real-time, etc.) and enforce appropriate network policies, even if a misbehaving application tries
to evade the rate-limit policies. If an application attempts to bypass rate-limiting by changing its 5-tuple or creating multiple flows,
the OS can detect this and manage the application's traffic accordingly.</t>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="provisioning-domains-split-dns-additional-information">
        <name>Provisioning Domains Split DNS Additional Information</name>
        <t>IANA is requested to add the following entry to the "Additional Information PvD Keys"
registry under the "Provisioning Domains (PvDs)" registry group <xref target="IANA-PVD"/>:</t>
        <dl>
          <dt>JSON key:</dt>
          <dd>
            <t>"nrlp"</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>"Network Rate-Limit Policies (NRLPs)"</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>Array of Objects</t>
          </dd>
        </dl>
        <t>Example:</t>
        <artwork><![CDATA[
   {
      "nrlp":[
         {
            "scope":0,
            "direction":0,
            "tc":0,
            "cir":50,
            "cbs": 10000
         }
      ]
   }
]]></artwork>
        <dl>
          <dt>Reference:</dt>
          <dd>
            <t>This-Document</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-pvd-network-rate-limit-policies-nrlps-registry">
        <name>New PvD Network Rate-Limit Policies (NRLPs) Registry</name>
        <t>IANA is requested to create a new registry "PvD Rate-Limit Policies (NRLPs)" registry,
within the "Provisioning Domains (PvDs)" registry group.</t>
        <t>The initial contents of this registry are provided in <xref target="iana-pvd-initial"/>.</t>
        <table anchor="iana-pvd-initial">
          <name>Initial PvD Network Rate-Limit Policies (NRLPs) Registry Content</name>
          <thead>
            <tr>
              <th align="left">JSON key</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
              <th align="left">Example</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scope</td>
              <td align="left">Specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0)</td>
              <td align="left">Boolean</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">direction</td>
              <td align="left">Indicates the traffic direction to which a policy applies</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">reliability</td>
              <td align="left">Specifies whether the policy is for both reliable and unreliable traffic (when set to "0"), for reliable (when set to "1"), or for unreliable traffic (when set to "2")</td>
              <td align="left">integer</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">tc</td>
              <td align="left">Specifies a traffic category to which this policy applies</td>
              <td align="left">Integer</td>
              <td align="left">0</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cir</td>
              <td align="left">Committed Information Rate (CIR)</td>
              <td align="left">Integer</td>
              <td align="left">50</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cbs</td>
              <td align="left">Committed Burst Size (CBS)</td>
              <td align="left">Integer</td>
              <td align="left">10000</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>Assignments must not be added directly to the "PvD Network Rate-Limit Policies (NRLPs)" registry.
When a new attribute is added to the "SCONE Rate-Limit Policy Objects" Registry Group created by <xref target="I-D.brw-scone-throughput-advice-blob"/>,
a new JSON key is mirrored in the "PvD Network Rate-Limit Policies (NRLPs)" registry.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="I-D.brw-scone-throughput-advice-blob">
          <front>
            <title>Throughput Advice Object for SCONE</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="13" month="December" year="2024"/>
            <abstract>
              <t>   Traffic exchanged over a network may be subject to rate-limit
   policies for various operational reasons.  This document specifies a
   generic object (called, Throughput Advice) that can be used by
   mechanisms for hosts to dynamically discover these network rate-limit
   policies.  This information is then passed to applications that might
   adjust their behaviors accordingly.

   The design of the throughput advice object is independent of the
   discovery channel (protocol, API, etc.).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-brw-scone-throughput-advice-blob-02"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-PVD" target="https://www.iana.org/assignments/pvds/">
          <front>
            <title>Provisioning Domains (PvDs)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRLP-WIRE" target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery/blob/main/example-nrlp-wire-format.md">
          <front>
            <title>Examples of Wire Format Options</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="RFC8273">
          <front>
            <title>Unique IPv6 Prefix per Host</title>
            <author fullname="J. Brzozowski" initials="J." surname="Brzozowski"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document outlines an approach utilizing existing IPv6 protocols to allow hosts to be assigned a unique IPv6 prefix (instead of a unique IPv6 address from a shared IPv6 prefix). Benefits of using a unique IPv6 prefix over a unique service-provider IPv6 address include improved host isolation and enhanced subscriber management on shared network segments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8273"/>
          <seriesInfo name="DOI" value="10.17487/RFC8273"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
      </references>
    </references>
    <?line 480?>

<section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Tommy Pauly for the comment on PvD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
