<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-sconepro-rate-policy-discovery-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-sconepro-rate-policy-discovery-01"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="07"/>
    <area>wit</area>
    <workgroup>sconepro</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 100?>

<t>Traffic exchanged over a network attachment may be subject to rate-limit policies.
These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts using Neighbor Discovery options. Examples of such
properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a new DHCP option is also defined.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 109?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="context">
        <name>Context</name>
        <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
successfully allowing data exchange over these links. The required setup is referred to in this document as network attachments,
while the underlying link is referred to as "bearers".</t>
        <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN, cellular) to graft customer terminating points to a network.</t>
        <ul empty="true">
          <li>
            <t>Network attachment is also known as "Attachment Circuit (AC)" which is an established concept in the industry and also in the IETF (<xref target="RFC4026"/>, <xref target="RFC4664"/>, <xref target="RFC4364"/>, etc.).</t>
          </li>
        </ul>
        <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example).These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden from the network. The policies enforced at the network
for an AC are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple ACs (e.g., CE#2).</t>
        <figure anchor="ac">
          <name>Sample Network Attachments</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
                <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
                <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
                <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
                <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
                <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
                <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
                <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
                <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
                <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
                <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
                <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
                <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
                <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
                <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
                <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
                <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
                <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
                <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
                <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
                <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
                <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
                <g class="text">
                  <text x="472" y="36">Hosts</text>
                  <text x="456" y="52">O</text>
                  <text x="472" y="52">O</text>
                  <text x="488" y="52">O</text>
                  <text x="472" y="68">\|/</text>
                  <text x="404" y="100">AC</text>
                  <text x="36" y="116">UE#1</text>
                  <text x="404" y="116">AC</text>
                  <text x="476" y="116">CE#2</text>
                  <text x="156" y="132">AC</text>
                  <text x="272" y="148">Network</text>
                  <text x="156" y="164">AC</text>
                  <text x="36" y="196">CE#1</text>
                  <text x="404" y="196">AC</text>
                  <text x="476" y="196">CE#3</text>
                  <text x="40" y="228">/|\</text>
                  <text x="480" y="228">/|\</text>
                  <text x="24" y="244">O</text>
                  <text x="40" y="244">O</text>
                  <text x="56" y="244">O</text>
                  <text x="464" y="244">O</text>
                  <text x="480" y="244">O</text>
                  <text x="496" y="244">O</text>
                  <text x="40" y="260">Hosts</text>
                  <text x="480" y="260">Hosts</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---AC----+      |
| UE#1 |      |         |                    +---AC----+ CE#2 |
'------'      +---AC----+                    |         '------'
                        |     Network        |
.------.      .---AC----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---AC----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
          </artset>
        </figure>
        <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over an AC. A comprehensive list of provisioning parameters that are available on
the PE-side of an AC is documented in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
        <t>The required set of parameters is a function of the service offering. For example, a very limited set of parameters is required for mass-market
service offering while a more elaborated set is required for Enterprise services (e.g., Layer 2 VPN <xref target="RFC9291"/> or Layer 3 VPN <xref target="RFC9182"/>). This document
<strong>leverages access control, authorization, and authentication mechanisms that are already in place for the delivery of services over these ACs</strong>. An example of an AC provided over a 3GPP network is depicted in <xref target="ex-arch"/>. It is out of the scope of this document to describe all involved components. Readers may refer to <xref target="TS-23.501"/> for more details.</t>
        <t><xref target="sec-aaa"/> provides another example of how existing tools can be leveraged for AAA purposes.</t>
        <figure anchor="ex-arch">
          <name>5GS Architecture</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="536" viewBox="0 0 536 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,32 L 24,64" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 136,240 L 136,272" fill="none" stroke="black"/>
                <path d="M 144,32 L 144,64" fill="none" stroke="black"/>
                <path d="M 144,96 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,64" fill="none" stroke="black"/>
                <path d="M 168,240 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,64 L 192,96" fill="none" stroke="black"/>
                <path d="M 192,240 L 192,272" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
                <path d="M 216,96 L 216,128" fill="none" stroke="black"/>
                <path d="M 216,160 L 216,192" fill="none" stroke="black"/>
                <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
                <path d="M 256,240 L 256,272" fill="none" stroke="black"/>
                <path d="M 280,64 L 280,96" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 304,240 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,96 L 312,128" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,64" fill="none" stroke="black"/>
                <path d="M 328,160 L 328,192" fill="none" stroke="black"/>
                <path d="M 352,64 L 352,96" fill="none" stroke="black"/>
                <path d="M 352,240 L 352,272" fill="none" stroke="black"/>
                <path d="M 376,32 L 376,64" fill="none" stroke="black"/>
                <path d="M 392,240 L 392,272" fill="none" stroke="black"/>
                <path d="M 400,32 L 400,64" fill="none" stroke="black"/>
                <path d="M 424,64 L 424,96" fill="none" stroke="black"/>
                <path d="M 440,240 L 440,272" fill="none" stroke="black"/>
                <path d="M 448,32 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 96,32 L 144,32" fill="none" stroke="black"/>
                <path d="M 168,32 L 216,32" fill="none" stroke="black"/>
                <path d="M 256,32 L 304,32" fill="none" stroke="black"/>
                <path d="M 328,32 L 376,32" fill="none" stroke="black"/>
                <path d="M 400,32 L 448,32" fill="none" stroke="black"/>
                <path d="M 24,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,64 L 144,64" fill="none" stroke="black"/>
                <path d="M 168,64 L 216,64" fill="none" stroke="black"/>
                <path d="M 256,64 L 304,64" fill="none" stroke="black"/>
                <path d="M 328,64 L 376,64" fill="none" stroke="black"/>
                <path d="M 400,64 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 120,128 L 168,128" fill="none" stroke="black"/>
                <path d="M 192,128 L 240,128" fill="none" stroke="black"/>
                <path d="M 288,128 L 368,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 168,160" fill="none" stroke="black"/>
                <path d="M 192,160 L 240,160" fill="none" stroke="black"/>
                <path d="M 288,160 L 368,160" fill="none" stroke="black"/>
                <path d="M 8,206 L 480,206" fill="none" stroke="black"/>
                <path d="M 8,210 L 480,210" fill="none" stroke="black"/>
                <path d="M 136,240 L 168,240" fill="none" stroke="black"/>
                <path d="M 192,240 L 256,240" fill="none" stroke="black"/>
                <path d="M 304,240 L 352,240" fill="none" stroke="black"/>
                <path d="M 392,240 L 440,240" fill="none" stroke="black"/>
                <path d="M 504,240 L 512,240" fill="none" stroke="black"/>
                <path d="M 168,256 L 192,256" fill="none" stroke="black"/>
                <path d="M 256,256 L 304,256" fill="none" stroke="black"/>
                <path d="M 352,256 L 392,256" fill="none" stroke="black"/>
                <path d="M 440,256 L 488,256" fill="none" stroke="black"/>
                <path d="M 136,272 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,272 L 256,272" fill="none" stroke="black"/>
                <path d="M 304,272 L 352,272" fill="none" stroke="black"/>
                <path d="M 392,272 L 440,272" fill="none" stroke="black"/>
                <path d="M 504,272 L 512,272" fill="none" stroke="black"/>
                <path d="M 168,288 L 216,288" fill="none" stroke="black"/>
                <path d="M 240,288 L 312,288" fill="none" stroke="black"/>
                <path d="M 504,240 C 483.2,240 483.2,272 504,272" fill="none" stroke="black"/>
                <path d="M 512,240 C 532.8,240 532.8,272 512,272" fill="none" stroke="black"/>
                <path d="M 164,232 L 172,216" fill="none" stroke="black"/>
                <path d="M 180,200 L 188,184" fill="none" stroke="black"/>
                <path d="M 188,184 L 196,168" fill="none" stroke="black"/>
                <path d="M 380,168 L 388,184" fill="none" stroke="black"/>
                <path d="M 388,184 L 396,200" fill="none" stroke="black"/>
                <path d="M 404,216 L 412,232" fill="none" stroke="black"/>
                <g class="text">
                  <text x="44" y="52">NSSF</text>
                  <text x="120" y="52">NEF</text>
                  <text x="192" y="52">NRF</text>
                  <text x="280" y="52">PCF</text>
                  <text x="352" y="52">UDM</text>
                  <text x="420" y="52">AF</text>
                  <text x="24" y="84">Nnssf</text>
                  <text x="100" y="84">Nnef</text>
                  <text x="172" y="84">Nnrf</text>
                  <text x="260" y="84">Npcf</text>
                  <text x="332" y="84">Nudm</text>
                  <text x="440" y="84">Naf</text>
                  <text x="120" y="116">Nausf</text>
                  <text x="196" y="116">Namf</text>
                  <text x="292" y="116">Nsmf</text>
                  <text x="136" y="148">│AUSR</text>
                  <text x="168" y="148">│</text>
                  <text x="192" y="148">│</text>
                  <text x="216" y="148">AMF</text>
                  <text x="240" y="148">│</text>
                  <text x="288" y="148">│</text>
                  <text x="328" y="148">SMF</text>
                  <text x="368" y="148">│</text>
                  <text x="32" y="196">Control</text>
                  <text x="88" y="196">Plane</text>
                  <text x="164" y="196">N1</text>
                  <text x="228" y="196">N2</text>
                  <text x="340" y="196">N4</text>
                  <text x="404" y="196">N4</text>
                  <text x="20" y="228">User</text>
                  <text x="64" y="228">Plane</text>
                  <text x="216" y="228">|</text>
                  <text x="328" y="228">│</text>
                  <text x="284" y="244">N3</text>
                  <text x="372" y="244">N9</text>
                  <text x="460" y="244">N6</text>
                  <text x="148" y="260">UE</text>
                  <text x="224" y="260">(R)AN</text>
                  <text x="328" y="260">UPF</text>
                  <text x="416" y="260">UPF</text>
                  <text x="508" y="260">DN</text>
                  <text x="160" y="292">|</text>
                  <text x="228" y="292">AC</text>
                  <text x="320" y="292">|</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
  .-----.  .-----.  .-----.    .-----.  .-----.  .-----.
  |NSSF |  | NEF |  | NRF |    | PCF |  | UDM |  | AF  |
  '--+--'  '--+--'  '--+--'    '--+--'  '--+--'  '--+--'
Nnssf|    Nnef|    Nnrf|      Npcf|    Nudm|        |Naf
  ---+--------+--+-----+--+-------+---+----+--------+---
            Nausf|    Namf|       Nsmf|
              .--+--.  .--+--.     .--+------.
              │AUSR │  │ AMF │     │   SMF   │
              '-----'  '--+--'     '----+----'
                       ╱  |             |      ╲
Control Plane      N1 ╱   |N2           |N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     |             │         ╲
                .---.  .-------.  N3 .--+--. N9 .--+--. N6   .--.
                |UE +--+ (R)AN +-----+ UPF +----+ UPF +-----( DN )
                '---'  '-------'     '-----'    '-----'      '--'
                   |-------AC----------|
]]></artwork>
          </artset>
        </figure>
        <ul empty="true">
          <li>
            <t>The "AC" mention in <xref target="ex-arch"/> is not present in <xref target="TS-23.501"/>. It is added to the figure for the readers' convenience to position an attachment circuit.</t>
          </li>
        </ul>
      </section>
      <section anchor="networks-are-already-sharing-network-properties-with-hosts">
        <name>Networks Are Already Sharing Network Properties with Hosts</name>
        <t>To optimally deliver connectivity services, networks also advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
        <dl>
          <dt>Link Maximum Transmission Unit (MTU):</dt>
          <dd>
            <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
          </dd>
          <dt/>
          <dd>
            <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
          </dd>
          <dt/>
          <dd>
            <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
          </dd>
          <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
          <dd>
            <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
          </dd>
          <dt>Encrypted DNS option <xref target="RFC9463"/>:</dt>
          <dd>
            <t>This option is used to discover encrypted DNS resolvers of a network.</t>
          </dd>
        </dl>
      </section>
      <section anchor="whats-in">
        <name>What's In?</name>
        <t><xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> discusses some use cases where it is beneficial to share policies with the hosts. <strong>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/></strong>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4.</t>
        <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
        <t>This document uses the host/network metadata specified in <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        <t>In order to ensure consistent design for both IPv4 and IPv6 ACs, <xref target="sec-blob"/> groups the set of NRLP parameters that are returned independent of the address family. This blob can be leveraged in networks where DHCP is not used and ease the mapping with specific protocols used in these networks. For example, <strong><em>a Protocol Configuration Option (PCO) <xref target="TS-24.008"/> NRLP Information Element can be defined in 3GPP</em></strong>.</t>
        <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document.</t>
        <t>Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
        <ul empty="true">
          <li>
            <t><xref target="sec-pvd"/> describes a candidate discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>. That approach requires more discussion as PvD is not currently deployed in mobile networks.</t>
          </li>
        </ul>
      </section>
      <section anchor="whats-out">
        <name>What's Out?</name>
        <t>This document does not make any assumption about the type of the network (fixed, cellular, etc.) that terminates an AC.</t>
        <t>Likewise, the document does not make any assumption about the services or applications that are delivered over an AC. Whether one or multiple services
are bound to the same AC is deployment specific.</t>
        <t>Applications will have access to all these NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy (all traffic, streaming, etc.). An application that couples multiple flow types will adjust each flow type to be consistent with the specific policy for the relevant traffic category. Likewise, a host with multiple ACs may use the discovered NRLPs AC to decide how to distribute its flows over these ACs (prefer an AC to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy. Readers should refer, e.g., to <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> for some examples.</t>
        <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/> or <xref section="8" sectionFormat="of" target="I-D.ietf-masque-quic-proxy"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
        <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link.</t>
      </section>
      <section anchor="design-motivation-rationale">
        <name>Design Motivation &amp; Rationale</name>
        <t>The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fate sharing</t>
          </li>
          <li>
            <t>Atomic configuration</t>
          </li>
          <li>
            <t>Updatability: change the policy at any time</t>
          </li>
          <li>
            <t>Deployability</t>
          </li>
        </ul>
        <t>The solution specified in the document is designed to <strong>ease integration with network management tools</strong> that are used to manage and expose policies. It does so by leveraging the policy structure defined in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>. That same structure is also used in the context of service activation such as Network Slicing <xref target="RFC9543"/>; see the example depicted in Appendix B.5 of <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
        <t>The solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not require any data plane change</strong>.</t>
          </li>
          <li>
            <t><strong>Applicable to any transport protocol</strong>.</t>
          </li>
          <li>
            <t><strong>Does not impact the connection setup delay</strong>.</t>
          </li>
          <li>
            <t><strong>Does not require to reveal the identity of the target server or the application itself</strong> to consume the signal.</t>
          </li>
          <li>
            <t><strong>Supports cascaded environments</strong> where multiple levels to enforce rate-limiting polices is required (e.g., WAN and LAN shown in <xref target="ac-casc"/>). NRLP signals can be coupled or decoupled as a function of the local policy.</t>
          </li>
          <li>
            <t><strong>Supports signaling policies bound to one or both traffic directions</strong>.</t>
          </li>
          <li>
            <t>Is able to <strong>signal whether a policy applies to a specific host or all hosts of a given subscriber</strong>.</t>
          </li>
        </ul>
        <figure anchor="ac-casc">
          <name>Example of Cascaded NRLPs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="424" viewBox="0 0 424 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                <path d="M 64,32 L 64,80" fill="none" stroke="black"/>
                <path d="M 64,112 L 64,160" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,48 L 144,144" fill="none" stroke="black"/>
                <path d="M 176,48 L 176,144" fill="none" stroke="black"/>
                <path d="M 248,32 L 248,176" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,176" fill="none" stroke="black"/>
                <path d="M 8,32 L 64,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 64,48 L 96,48" fill="none" stroke="black"/>
                <path d="M 144,48 L 176,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 96,80 L 144,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 248,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
                <path d="M 96,112 L 144,112" fill="none" stroke="black"/>
                <path d="M 64,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 248,176 L 416,176" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Host</text>
                  <text x="36" y="68">#1</text>
                  <text x="160" y="84">C</text>
                  <text x="100" y="100">nrlp#2</text>
                  <text x="160" y="100">P</text>
                  <text x="328" y="100">Network</text>
                  <text x="160" y="116">E</text>
                  <text x="212" y="116">nrlp#1</text>
                  <text x="36" y="132">Host</text>
                  <text x="36" y="148">#2</text>
                  <text x="100" y="164">nrlp#3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.------.                      .--------------------.
| Host +---+     .---.        |                    |
|  #1  |   |     |   |        |                    |
'------'   +-----+ C |        |                    |
         nrlp#2  | P +--------+      Network       |
.------.   .-----+ E | nrlp#1 |                    |
| Host |   |     |   |        |                    |
|  #2  +---'     '---'        |                    |
'------' nrlp#3               |                    |
                              '--------------------'
]]></artwork>
          </artset>
        </figure>
        <t>Compared to a proxy or an encapsulation-based proposal (e.g., <xref target="I-D.ihlar-masque-sconepro-mediabitrate"/>), the solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not impact the MTU tweaking</strong>: No packet overhead is required.</t>
          </li>
          <li>
            <t><strong>Does not suffer from side effects of multi-layer encryption schemes</strong> on the packet processing and overall performance of involved network nodes. Such issues are encountered, e.g., with the tunneled mode or long header packets in the forwarded QUIC proxy mode <xref target="I-D.ietf-masque-quic-proxy"/>.</t>
          </li>
          <li>
            <t><strong>Does not suffer from nested congestion control</strong> for tunneled proxy mode.</t>
          </li>
          <li>
            <t><strong>Does not incur multiple round-trips</strong> in the forwarding mode for the client to start sending Short Header packets.</t>
          </li>
          <li>
            <t><strong>Does not incur the overhead of unauthenticated re-encryption of QUIC packets</strong> in the scramble transform of the forwarding mode.</t>
          </li>
          <li>
            <t><strong>Does not impact the forwarding peformance of network nodes</strong>. For example, the proxy forwarded mode <xref target="I-D.ietf-masque-quic-proxy"/> requires rewriting connection identifiers; that is, the performance degradation will be at least equivalent to NAT.</t>
          </li>
          <li>
            <t><strong>Does not suffer from the complications of IP address sharing <xref target="RFC6269"/></strong>. Such issues are likely to be experienced for proxy-based solutions that multiplex internal connections using one or more external IP addresses.</t>
          </li>
          <li>
            <t><strong>Does not suffer from penalizing the proxy</strong> which could serve both good and bad clients (e.g., launching Layer 7 DDoS attacks).</t>
          </li>
          <li>
            <t><strong>Does not require manipulating extra steering policies on the host</strong> to decide which flows can be forwarded over or outside the proxy connection.</t>
          </li>
          <li>
            <t><strong>Requires a minor change to the network</strong>: For IPv6, upgrade PE nodes to support a new ND option. Note that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>. For IPv4, configure DHCP servers to include a new DHCP option.</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-deployment-cases">
        <name>Sample Deployment Cases</name>
        <t>Some deployment use cases for NRLP are provided below:</t>
        <ul spacing="normal">
          <li>
            <t>A network may advertize an NRLP when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example). The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
          </li>
          <li>
            <t>Discovery of intentional policy applied on ACs (peering links, CE-PE links, etc.) when such information is not made available during the service activation or when network upgrades are performed.</t>
          </li>
          <li>
            <t>A user may configure policies on the CPE such as securing some resources to a specific internal host used for gaming or video streaming. The CPE can use the NRLP option to share these rate-limit policies to connected hosts to adjust their forwarding behavior.</t>
          </li>
        </ul>
        <t>Operational considerations are discussed in <xref target="sec-ops"/>, while deployment incentives are described in <xref target="sec-inc"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref section="2" sectionFormat="of" target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="RFC9473"/>.</t>
      <t>Also, this document makes use fo the following terms:</t>
      <dl>
        <dt>Reactive policy:</dt>
        <dd>
          <t>Treatment given to a flow when an exceptional event
occurs, such as diminished throughput to the host caused by radio
interference or weak radio signal, congestion on the network
caused by other users or other applications on the same host.</t>
        </dd>
        <dt>Intentional policy:</dt>
        <dd>
          <t>Configured bandwidth, pps, or similar throughput
constraints applied to a flow, application, host, or subscriber.</t>
        </dd>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate of a flow.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>NRLP Blob</name>
      <t>This section defines the set of attributes that are included in an NRLP blob:</t>
      <dl>
        <dt>Optional Parameter Flags (OPF):</dt>
        <dd>
          <t>These flags indicate the presence of some optional parameters. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>E:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Excess Information Rate (EIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that EIR is not present.</t>
            </dd>
            <dt>P:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Peak Information Rate (PIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that PIR is not present.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-opf"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>Flow flags (FF):</dt>
        <dd>
          <t>These flags are used to express some generic properties of the flow. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>S (Scope):</dt>
            <dd>
              <t>1-bit field which specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0).</t>
            </dd>
            <dt>D (Direction):</dt>
            <dd>
              <t>1-bit flag which indicates the direction on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "1", this flag indicates that this policy is for
network-to-host direction.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that this policy is for
host-to-network direction.</t>
            </dd>
            <dt>R (Reliablity):</dt>
            <dd>
              <t>2-bit flag which indicates the reliability type of traffic on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "00b", this flag indicates that this policy is for unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "01b", this flag indicates that this policy is for reliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "10b", this flag indicates that this policy is for both reliable and unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>No meaning is associated with setting the field to "11b". Such value <bcp14>MUST</bcp14> be silently ignored by the receiver.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-ff"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>TC (Traffic Category):</dt>
        <dd>
          <t>6-bit field which specifies a traffic category to which this policy applies.</t>
        </dd>
        <dt/>
        <dd>
          <t>The following values are supported:
</t>
          <ul spacing="normal">
            <li>
              <t>"0": All traffic. This is the default value.</t>
            </li>
            <li>
              <t>"1": Streaming</t>
            </li>
            <li>
              <t>"2": Real-time</t>
            </li>
            <li>
              <t>"3": Bulk traffic</t>
            </li>
            <li>
              <t>4-63: Unassigned values</t>
            </li>
          </ul>
        </dd>
        <dt>Committed Information Rate (CIR) (Mbps):</dt>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category.</t>
        </dd>
        <dt/>
        <dd>
          <t>If set to 0, this indicates to the host that an alternate path (if any) should be preferred over this one.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Committed Burst Size (CBS) (bytes):</dt>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Excess Information Rate (EIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if the E flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category that is out of profile.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Excess Burst Size (EBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if EIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Indicates the maximum excess burst size that is allowed while not complying with the CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Information Rate (PIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if P flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Burst Size (PBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if PIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
      </dl>
      <t>The reader should refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of CIR/CBS/EIR/EBS/PIR/PBS are used for policing. Typically:</t>
      <ul spacing="normal">
        <li>
          <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
        </li>
        <li>
          <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS.</t>
        </li>
      </ul>
    </section>
    <section anchor="ipv6-ra-nrlp-option">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of the IPv6 RA NRLP option, with optional fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-format">
          <name>NRLP Option Format with Optional Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Excess Information Rate (EIR) (Optional)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Excess Burst Size (EBS) (Optional)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Peak Information Rate (PIR) (Optional)          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Peak Burst Size (PBS) (Optional)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="dhcp-nrlp-option">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format-1">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of this field, with optional parameters included, is shown in <xref target="nrlp-m-format"/>.</t>
        <figure anchor="nrlp-format">
          <name>NRLP Instance Data Format with Optional Fields Included</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
|  Excess Information Rate      |  |
|             (EIR)             |  O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  P
|    Excess Burst Size (CBS)    |  T
|                               |  I
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  O
|    Peak Information Rate      |  N
|             (PIR)             |  A
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  L
|      Peak Burst Size (PBS)    |  |
|                               |  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-ops">
      <name>Operational Considerations</name>
      <t>Sharing NRLP signals are not intended to replace usual actions to soften bottlenck issues (e.g., adequate network dimensioning and upgrades). However, given that such actions may not be always immediately possible or economically justified, NRLP signals can be considered as complementary mitigations to soften these issues by introducing some collaboration between a host and
its networks to adjust their behaviors.</t>
      <t>NRLP senders should be configured with instructions about the type of network rate-limit policies to be shared with requesting hosts. These types can be provided using mechanisms such as <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>In contexts where the bitrate policies are known during the establishment of the underlying bearer (e.g., GBR PDU Sessions), sending NRLP signals over the AC may be redundant and should thus be disabled.</t>
      <t>In contexts where the (average) bitrate policies provided during the establishment of a bearer cannot be refreshed to echo network-specific conditions (e.g., overload) using bearer-specific mechanisms, sending NRLP signals over the AC would allow control the load at the source.</t>
      <t>When both bearer-specific policies and NRLP signals are communicated to a host, the NRLP signals takes precedence.</t>
      <t>Rate-limit policies enforced at the network are assumed to be consistent with the local jurisdictions. For example, <xref target="BEREC"/> says the following:</t>
      <ul empty="true">
        <li>
          <t>ISPs are prohibited from blocking or slowing down of Internet traffic, except where necessary. The exceptions are limited to: traffic management to comply with a legal order, to ensure network integrity and security, and to manage congestion, provided that equivalent categories of traffic are treated equally.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-inc">
      <name>Deployment Incentives</name>
      <section anchor="networks">
        <name>Networks</name>
        <t>There are a set of tradeoffs for networks to deploy NRLP discovery:</t>
        <ul spacing="normal">
          <li>
            <t>Cost vs. benefit</t>
          </li>
          <li>
            <t>Impact on operations vs incentive to deploy</t>
          </li>
          <li>
            <t>Enhanced experience vs. impacts on nominal mode</t>
          </li>
        </ul>
        <t>The procedure defined in the document provides a mechanism to assist networks managing the load at the source and, thus, contribute to better handle network overloads and optimize the use
of resources under non nominal conditions. The mechanism also allows to enhance the quality of experience at the LAN by providing a simple tool to communicate local policies to hosts. A minimal change is required to that aim.</t>
        <t>With the OS support, the following benefits might be considered by networks:</t>
        <dl>
          <dt>Improved Network Performance:</dt>
          <dd>
            <t>The OS can schedule network requests more efficiently, preventing network congestion, and improving overall stability and network performance with NRLP signals.</t>
          </dd>
          <dt>Cost Efficiency:</dt>
          <dd>
            <t>By managing network usage based on known rate limits, the OS can help reduce network-related costs. However, this is difficult to assess.</t>
          </dd>
        </dl>
        <t>Networks that throttle bandwidth for reasons that are not compliant with local jurisdictions, not communicated to customers, etc. are unlikely to share NRLP signals. If these signals are shared, it is unlikely that they will mirror the actual network configuration (e.g., application-specific policies).</t>
      </section>
      <section anchor="sec-app-inc">
        <name>Applications</name>
        <t>Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed
how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals
depends upon:</t>
        <ul spacing="normal">
          <li>
            <t>The extra cost that is required to support both mechanisms at the application layer.</t>
          </li>
          <li>
            <t>The complexity balance between performing the measurements vs. consuming the signal.</t>
          </li>
          <li>
            <t>Whether the measurements ("assessed property" per <xref target="RFC9473"/>) reflect actual network conditions or severely diverge.</t>
          </li>
          <li>
            <t>The availability of the network signals at the first place: it is unlikely that all networks will support sending the signals. Deployment incentives at the network may vary.</t>
          </li>
          <li>
            <t>The host support may be variable.</t>
          </li>
        </ul>
        <t>Applications that don't support (embedded) bandwidth measurement schemes will be enriched with the NRLP signals as this will be exposed by an OS API.</t>
      </section>
      <section anchor="host-os">
        <name>Host OS</name>
        <dl>
          <dt>API to facilitate Application Development:</dt>
          <dd>
            <t>An OS can provide more accurate available bandwidth to applications through the API (as mentioned in <xref target="sec-app-inc"/>), making implementation easier for applications that don't requrie dedicated bandwidth measurement.</t>
          </dd>
          <dt>Prevent Abuse:</dt>
          <dd>
            <t>The OS can allocate network resources more fairly among different processes, with NRLP signals, ensuring that no single process monopolizes the network.</t>
          </dd>
          <dt>Better Resource Management:</dt>
          <dd>
            <t>OS can also optimize resource allocation, by deprioritizing background/inactive applications in the event of high network utilization.</t>
          </dd>
          <dt>Enhanced Security:</dt>
          <dd>
            <t>Awareness of NRLPs can help the OS detect and mitigate network-related security threats, such as denial-of-service (DoS) attacks.</t>
          </dd>
          <dt>Improved User Experience:</dt>
          <dd>
            <t>By avoiding network congestion and ensuring fair resource allocation, the OS can provide a smoother, more responsive user experience.</t>
          </dd>
          <dt>Improved Application Development Efficiency:</dt>
          <dd>
            <t>OS providing rate limits through an API (as mentioned in <xref target="sec-app-inc"/>) can provide the above listed benefits at per application level.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-rlp">
        <name>Rate-Limit Policy Objects Registry Group</name>
        <t>This document requests IANA to create a new registry group entitled "Rate-Limit Policy Objects".</t>
      </section>
      <section anchor="sec-iana-opf">
        <name>Optional Parameter Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Optional Parameter Flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-op-flags"/>.</t>
        <table anchor="iana-op-flags">
          <name>Optional Parameter Flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">E-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">P-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ff">
        <name>Flow flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Flow flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-flow-flags"/>.</t>
        <table anchor="iana-flow-flags">
          <name>Flow flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Scope (S) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Direction (D) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3-4</td>
              <td align="left">Reliability (R) Flags</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left"> </th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="I-D.rwbr-sconepro-flow-metadata">
          <front>
            <title>Flow Metadata for Collaborative Host/Network Signaling</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document defines per-flow and per-packet metadata for both
   network-to-host and host-to-network signaling in Concise Data
   Definition Language (CDDL) which expresses both CBOR and JSON.  The
   common metadata definition allows interworking between signaling
   protocols with high fidelity.  The metadata is also self- describing
   to improve interpretation by network elements and endpoints while
   reducing the need for version negotiation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-sconepro-flow-metadata-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
          <front>
            <title>Bandwidth measurement for QUIC</title>
            <author fullname="Zafer Gurel">
              <organization/>
            </author>
            <author fullname="Ali C. Begen">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-24.008" target="https://www.3gpp.org/DynaReport/24008.htm">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (Release 18)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="BEREC" target="https://www.berec.europa.eu/en/all-you-need-to-know-about-net-neutrality-rules-in-the-eu-0">
          <front>
            <title>All you need to know about Net Neutrality rules in the EU</title>
            <author>
              <organization>BEREC</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="6" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in I-D.ietf-opsawg-teas-
   attachment-circuit.

   The module augments the 'ietf-network' and the Service Attachment
   Point (SAP) models with the detailed information for the provisioning
   of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-07"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
          <front>
            <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="17" month="March" year="2024"/>
            <abstract>
              <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="I-D.ietf-masque-quic-proxy">
          <front>
            <title>QUIC-Aware Proxying Using HTTP</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Rosenberg" initials="E." surname="Rosenberg">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="12" month="February" year="2024"/>
            <abstract>
              <t>   This document defines an extension to UDP Proxying over HTTP that
   adds specific optimizations for proxied QUIC connections.  This
   extension allows a proxy to reuse UDP 4-tuples for multiple
   connections.  It also defines a mode of proxying in which QUIC short
   header packets can be forwarded using an HTTP/3 proxy rather than
   being re-encapsulated and re-encrypted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-masque-quic-proxy-01"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-10"/>
        </reference>
        <reference anchor="I-D.ihlar-masque-sconepro-mediabitrate">
          <front>
            <title>MASQUE extension for signaling media bitrate</title>
            <author fullname="Marcus Ihlar" initials="M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal the available bitrate for media traffic that is
   proxied through an HTTP server.  This information can be used by a
   media application to regulate its media bitrate in accordance with a
   network policy, as an alternative to in-network traffic shaping.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-masque-sconepro-mediabitrate-00"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="P. Roberts" initials="P." surname="Roberts"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber. Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing. These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches. Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on. Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
      </references>
    </references>
    <?line 841?>

<section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be considered as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":1,
         "scope":1,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
      <t>PvD NRLP object can be extended by defining new attributes (e.g., supply an ADN and locators of a network entity to negotiate advanced features with the network, reachability information of a network API to invoke differentiated forwarding behaviors, a slice identifier <xref target="TS-23.501"/><xref target="RFC9543"/>, etc.).</t>
    </section>
    <section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
