<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-panrg-scion-overview-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="SCION I-D">SCION Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-00"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>ETH Zuerich</organization>
      <address>
        <email>corine.dekatermuehlhaeuser@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>ETH Zuerich</organization>
      <address>
        <email>nicola.rustignoli@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="A." surname="Perrig" fullname="Adrian Perrig">
      <organization>ETH Zuerich</organization>
      <address>
        <email>adrian.perrig@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2022" month="May" day="18"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next-generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts.</t>
      <t>This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane. As SCION is already in production use today, the document concludes with an overview of SCION deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-overview_I-D/draft-dekater-panrg-scion-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-overview_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Introduction section explores the motivation to develop SCION, followed by a short description of SCION's main elements. The sections after the Introduction provide further insight into SCION's key concepts and deployment scenarios. The document concludes with some concrete case studies where SCION has been successfully deployed in production.</t>
      <section anchor="why">
        <name>Why SCION - Motivation</name>
        <t>Since its inception, the Internet has continued to expand, encompassing new uses over time. The continuous expansion has brought many issues to light, including a lack of control, limitations in scalability, performance and security, occurrences of severe outages, weak fault isolation, and energy consumption. With the core focus on functionality and operation, the current Internet offers little protection against attacks such as spoofing, IP-address hijacking, denial-of-service, and combinations of these. For more background information, see <xref target="SCHUCHARD2011"/>, <xref target="LABOVITZ2000"/>, <xref target="GRIFFIN1999"/>, <xref target="SAHOO2009"/>, and <xref target="RFC4264"/>.</t>
        <t>There have been numerous initiatives to address the above issues. Although these initiatives have brought many improvements, concerns regarding security and scalability still remain. For more details, see, e.g., <xref target="RFC4033"/>, <xref target="RFC6480"/>, <xref target="RFC8205"/>, and <xref target="RFC8446"/>, as well as <xref target="LYCHEV2013"/>, <xref target="LI2014"/>, <xref target="COOPER2013"/>, <xref target="ROTHENBERGER2017"/>, <xref target="MORILLO2021"/>, and <xref target="KING2022"/>.</t>
        <t>As a consequence, today's Internet fails to fulfil many users' requirements. This especially pertains to the demands of enterprises globally exchanging sensitive information, such as financial institutions, healthcare providers, universities, multinationals, governments, critical and transportation infrastructure operators. These users require the Internet to be highly available at all times. They expect reliable operation of the global network also in case of failures. They need availability guarantees across multiple routing domains, even in the presence of attacks. They further want to rely on an Internet that can be multilaterally governed and is free from global kill-switches.</t>
        <t>SCION has been developed in order to meet the above-mentioned requirements. SCION aims to reach the following goals:</t>
        <ul spacing="normal">
          <li>Provide high-availability architecture (also in the presence of adversaries)</li>
          <li>Provide fast failover in the case of inter-domain link or router failures</li>
          <li>Prevent from IP-address hijacking, DoS, and other attacks</li>
          <li>Enable path transparency as well as application-specific path optimizations</li>
          <li>Improve the inter-domain control plane's scalability</li>
          <li>Prepare the Internet for tomorrow's applications, such as virtual reality, Internet of Things (IoT), and all other applications requiring high-performance connectivity.</li>
        </ul>
        <t><strong>Note</strong>: A more detailed motivation for developing SCION will be described in a separate gap analysis internet draft.</t>
        <section anchor="scope-of-scion">
          <name>Scope of SCION</name>
          <t>The above section describes SCION's aspiration to improve <em>inter</em>-AS routing and to focus on providing end-to-end connectivity. However, SCION does not solve <em>intra</em>-AS routing issues, nor does it provide end-to-end payload encryption, and identity authentication. These topics, which are equally important for the Internet to perform well, lie outside the scope of SCION.</t>
        </section>
        <section anchor="practical-considerations-based-on-related-rfcs">
          <name>Practical Considerations Based on Related RFCs</name>
          <t>The SCION inter-domain routing concept has initially been developed by researchers of the ETH Zuerich <xref target="PERRIG2017"/>, and could in the meantime also gain attention and recognition in the international academic world. However, for an IT architecture to be successful, it must work well in practice, too. This section pays attention to the implementation considerations of a conceptual framework such as SCION in real life, on the basis of some RFCs exploring this topic. It also verifies in how far SCION meets the requirements mentioned and questions raised in these RFCs.</t>
          <section anchor="avoiding-pitfalls">
            <name>Avoiding Pitfalls</name>
            <t><xref target="RFC9049"/> describes why previous proposals to tackle some of the Internet's fundamental issues did not manage to succeed. SCION seems to avoid the pitfalls mentioned in that document. For example, SCION does not have to be adopted by the entire Internet to be effective: The routing architecture provides benefits already to early adapters. Even if only a small part of the global network works with SCION, adapters will still take advantage of using the SCION routing technology. Moreover, not only users of SCION benefit from it, also ISPs and operators benefit from deploying SCION: early deployments showed that providers can charge the use of SCION as premium connectivity, with users who are willing to pay for it. Furthermore, SCION can be installed on top of and function alongside the existing routing infrastructure and protocols--there is no need for high-impact changes in an operational network.</t>
            <t>Another RFC that must be mentioned in this context is <xref target="RFC5218"/>, "What Makes for a Successful Protocol?". SCION seems to fulfil most factors that contribute to the success of a protocol, as described in section 2.1 of the RFC. This includes such factors as offering a positive net value (i.e., the benefits of deploying SCION outweigh the costs), incremental deployability, and open source code availability. More importantly, SCION averts the failure criteria mentioned in section 1.4 of the RFC: SCION is already deployed and in use by many actors of the Swiss financial and academic ecosystems, and allows for multiple implementations, both open and closed source. As existing SCION implementations are easily portable, adoption in mainstream platforms is also possible.</t>
          </section>
          <section anchor="answering-questions">
            <name>Answering Questions</name>
            <t>SCION can be considered a <em>path-aware internetworking</em> architecture, as described in <xref target="RFC9217"/>. This RFC poses (open) questions that must be answered in order to realize such a path-aware networking system. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            <t>SCION intends to answer the questions raised in this RFC. This especially pertains to the second, third, seventh, and eighth question:</t>
            <ul spacing="normal">
              <li>How do endpoints and applications get access to accurate, useful, and trustworthy path properties?</li>
              <li>How can endpoints select paths to use for traffic in a way that can be trusted by the network, the endpoints, and the applications using them?</li>
              <li>How can a path-aware network in a path-aware internetwork be effectively operated, given control inputs from network administrators, application designers, and end users?</li>
              <li>How can the incentives of network operators and end users be aligned to realize the vision of path-aware networking, and how can the transition from current ("path-oblivious") to path-aware networking be managed?</li>
            </ul>
            <t>SCION's answers to these questions can be found in <xref target="key">Key Concepts</xref> and <xref target="deploy">Deployments</xref>, respectively.</t>
          </section>
        </section>
        <section anchor="why-now">
          <name>Why Now?</name>
          <t>The emergence of multiple SCION implementations and early deployments highlight the need for standardization. The time seems therefore ripe to take SCION to the IETF, also in order to contribute to the important discussion regarding path-aware networking.</t>
        </section>
      </section>
      <section anchor="scion-overview">
        <name>SCION Overview</name>
        <t>SCION has been designed to address the fundamental issues of today's Internet depicted in <xref target="why">Why SCION - Motivation</xref>. The following section gives a high-level overview of SCION's main elements, providing a basic understanding of this next-generation inter-network architecture.</t>
        <section anchor="network-architecture-and-naming">
          <name>Network Architecture and Naming</name>
          <t>SCION's main goal is to offer highly available and efficient inter-domain packet delivery--even in the presence of actively malicious entities. To achieve scalability and sovereignty, SCION organizes existing ASes into groups of independent routing planes, called <strong>Isolation Domains (ISD)</strong>. An AS can be a member of multiple ISDs. All ASes in an ISD agree on a set of trust roots, called the <strong>Trust Root Configuration (TRC)</strong>. The ISD is governed by a set of <strong>core ASes</strong>, which provide connectivity to other ISDs and manage the trust roots. Typically, a few distinguished ASes within an ISD form the ISD's core.</t>
          <t>Isolation domains serve the following purposes:</t>
          <ul spacing="normal">
            <li>They allow SCION to support trust heterogeneity, as each ISD can independently define its roots of trust;</li>
            <li>They provide transparency for trust relationships;</li>
            <li>They isolate the routing process within an ISD from external influences such as attacks and misconfigurations; and</li>
            <li>They improve the scalability of the routing protocol by separating it into a process within and one between ISDs.</li>
          </ul>
          <t>ISDs provide natural isolation of routing failures and misconfigurations, provide meaningful and enforceable trust, enable endpoints to optionally restrict traffic forwarding to trusted parts of the Internet infrastructure only, and enable scalable routing updates with high path-freshness.</t>
          <section anchor="links">
            <name>Links</name>
            <t>There are three types of links in SCION: core links, parent-child links, and peering links.</t>
            <ul spacing="normal">
              <li>A <strong>core link</strong> can only exist between two core ASes.</li>
              <li>A <strong>parent-child link</strong> requires that at least one of the two connected ASes is a non-core AS. ASes with a parent-child link usually belong to the same entity or have a provider-customer relationship.</li>
              <li>A <strong>peering link</strong> also includes at least one non-core AS.</li>
            </ul>
            <t>See <xref target="architecture"/> for a high-level overview of the SCION network structure.</t>
            <figure anchor="architecture">
              <name>SCION network structure</name>
              <artwork><![CDATA[
    ...............................
   :                               :
  :      [TRC]                      :
 :          (::::::::::::::)         :      ......................
:        (::::: ISD core :::::)       :    :                      :
:    (:: +---+ ::::::::: +---+ ::)    :   :    [TCR]               :
: (::::: |CAS|===+---+ : |CAS| :::::) :  :        (: ISD core :)    :
:    (:: +---+ : |CAS|===+---+====)===:==:=====(=+---+ :: +---+ :)  :
:       /(:::::: +---+ ::::::) \      :  :    (: |CAS| == |CAS| :)  :
:      /  (::::::: | :::::::)   \     :  :     ( +---+ :: +---+ )   :
:     /            |             o    :  :       /(::::::::::::)    :
:    o             |           +---+  :  :      /         \         :
:  +---+           |          /|ASb|  :  :     /           \        :
:  |ASa|           |         / +---+  :  :    o             o       :
:  +---+           |        /    |    :  :  +---+          +---+    :
:    |             |       /     |    :  :  |ASx| ---------|ASy|    :
:    |             |      /      o    :  :  +---+          +---+    :
:    o             o     /     +---+  :  :    |                     :
:  +---+         +---+  /      |ASe|  :  :    o                     :
:  |ASc|---------|ASd| o       +---+ -:--:--+---+                   :
:  +---+         +---+                :  :  |ASz|      ISD 2        :
 :                                   :    : +---+                  :
  :            ISD 1                :      ........................
   .................................
Legend:
                      |
                      |
Parent AS - child AS: o
Peering link: ----
Core link: ===
Core AS: CAS
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="routing">
          <name>Routing</name>
          <t>SCION operates on two routing levels: intra-ISD and inter-ISD. Both levels use <strong>path-segment construction beacons (PCBs)</strong> to explore network paths. A PCB is initiated by a core AS and then disseminated either within an ISD (to explore intra-ISD paths) or among core ASes (to explore core paths across different ISDs). The PCBs accumulate cryptographically protected path and forwarding information on AS-level, and store this information in the form of <strong>hop fields (HFs)</strong>. End hosts use information from these hop fields to create end-to-end forwarding paths for data packets, who carry this information in their packet headers. This concept is called <strong>packet-carried forwarding state (PCFS)</strong>. The concept also supports multi-path communication among end hosts.</t>
          <t>The process of creating an end-to-end forwarding path consists of the following steps:</t>
          <ol spacing="normal" type="1"><li>First, an AS discovers paths to other ASes, during the <em>path exploration</em> (or beaconing) phase.</li>
            <li>The AS then selects a few PCBs according to defined policies, transforms the selected PCBs into path segments, and registers these segments with its path infrastructure, thus making them available to other ASes. This happens during the <em>path registration</em> phase.</li>
            <li>During the <em>path resolution</em> phase, the actual creation of an end-to-end forwarding path to the destination takes place. For this, an end host performs (a) a <em>path lookup</em> step, to obtain path segments, and (b) a <em>path combination</em> step, to combine the forwarding path from the segments.</li>
          </ol>
          <t><xref target="beaconing"/> below shows the SCION routing process in a nutshell.</t>
          <figure anchor="beaconing">
            <name>SCION routing in a nutshell</name>
            <artwork><![CDATA[
+------------------+             +------------------+
| Path Exploration |             |                  |
|   (Beaconing)    |------------>|Path Registration |
|                  |             |                  |
+------------------+             +--------+---------+
                                          |
                        +-----------------+
                        |
     +------------------v-----------------------+
     |            Path Resolution               |
     |+--------------+     +-------------------+|
     || Path Lookup  |---->| Path Combination  ||
     |+--------------+     +-------------------+|
     +------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="isd-and-as-numbering">
            <name>ISD and AS numbering</name>
            <t>SCION decouples end-host addressing from inter-domain routing. Routing is based on the &lt;ISD, AS&gt; tuple, agnostic of end-host addressing. Existing AS numbers are inherited from the current Internet, but a 48-bit namespace allows for additional SCION AS numbers beyond the 32-bit space in use today. The end host local address is not used for inter-domain routing or forwarding, does not need to be globally unique, and can thus be an IPv4, IPv6, or MAC address, for example. A SCION address is therefore composed of the &lt;ISD, AS, local address&gt; 3-tuple.</t>
          </section>
        </section>
        <section anchor="infra-components">
          <name>Infrastructure Components</name>
          <t>The <strong>beacon service</strong>, the <strong>path service</strong>, and the <strong>certificate service</strong> are the main control-plane infrastructure components within a SCION AS. Each service can be deployed redundantly, depending on the AS's size and type. Existing Internal routers are used to forward packets inside the AS, while <em>SCION border routers</em> provide interconnectivity between ASes.</t>
          <ul spacing="normal">
            <li>The <em>beacon service</em> discovers path information. It is responsible for generating, receiving, and propagating PCBs. Periodically, the beacon service generates a set of PCBs, which are forwarded to its child ASes or neighboring core ASes. The PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>The <em>path service</em> stores mappings from AS identifiers to sets of announced path segments. The path service is organized as a hierarchical caching system similar to that of DNS. Through the beacon service, ASes select the set of path segments through which they want to be reached, and they register them to the path service in the ISD core.</li>
            <li>The <em>certificate service</em> keeps cached copies of certificates and manages keys and certificates for securing inter-AS communication. The certificate service is queried by the beacon service when validating the authenticity of PCBs (i.e., when the beacon service lacks a certificate).</li>
          </ul>
          <t><em>Border routers</em> are deployed at the edge of SCION ASes. The main task of border routers is to forward packets to a neighbor border router or to the destination host within the AS. While SCION takes care of inter-domain routing, it relies on existing routing protocols (e.g., IS-IS, OSPF, SR) and communication fabric (e.g., IP, MPLS) for intra-domain forwarding. <em>Internal routers</em>, therefore, do not need to be changed to support SCION.</t>
        </section>
        <section anchor="formal-verification">
          <name>Formal Verification</name>
          <t>An additional feature of SCION is its formal verification. The SCION network system consists of a variety of components such as routers, servers, and edge devices. Such a complex system eludes the mental capacities of human beings for considering all possible states and interactions. That is why SCION includes a formal verification framework developed by the Department of Computer Science of the ETH Zurich <xref target="KLENZE2021"/>. This guarantees that packet forwarding as well as SCION's authentication mechanisms and implementations are correct and consistent.</t>
        </section>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="key">
      <name>Key Concepts</name>
      <t>This section explains the SCION key concepts, including authentication, control- and data plane.</t>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>SCION's control plane relies on a public-key infrastructure called the <strong>control-plane PKI (CP-PKI)</strong>, which is organized on ISD-level. Each ISD can independently build its own roots of trust, defined in a file called <strong>trust root configuration (TRC)</strong>.</t>
        <t><strong>Note</strong>: This section describes the SCION authentication concept on a very high level. A much more detailed description of SCION's authentication will follow in a separate internet draft.</t>
        <section anchor="the-control-plane-pki-cp-pki">
          <name>The Control-Plane PKI (CP-PKI)</name>
          <t>Trust within each isolation domain is anchored in the trust root configuration (TRC) file. Each TRC contains a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD-policies that specify, for example, the TRC's usage, validity, and future updates. A TRC is a fundamental component of an CP-PKI.</t>
          <t>The initial TRC in an ISD is called the <strong>base TRC</strong>. This base TRC constitutes the ISD's trust anchor. It is signed during a signing ceremony and then distributed throughout the ISD. All entities within the ISD obtain the initial TRC with an offline mechanism such as a USB flash drive provided by a trusted AS, like the relevant ISP, or with an online mechanism that relies on a trust-on-first-use (TOFU) approach. However, all updates to the base TRCs are performed in a straightforward process that does not require any manual or out-of-band action (such as a software update), see <xref target="update">TRC Update and Verification</xref>.</t>
          <t><xref target="chain"/> shows the TRC trust chain and associated certificates. TRC 1 is the base TRC, and TRC 2 and 3 constitute updates to this base TRC. TRC 2 must be verified using the voting certificates in TRC 1. Control-plane (CP) root certificates are used to verify other CP certificates (which are in turn used to verify path-segment construction beacons PCBs).</t>
          <t>Each SCION AS must hold a private key (to sign PCBs) and a certificate attesting that it is the rightful owner of the corresponding public key. One of the main roles of the TRC is thus enabling the verification of <strong>AS certificates</strong> and PCBs.</t>
          <figure anchor="chain">
            <name>TRC contents and trust chain</name>
            <artwork><![CDATA[
                               TRC 2
               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
          </figure>
        </section>
        <section anchor="update">
          <name>TRC Update and Verification</name>
          <t>With a base TRC as trust anchor, TRCs can be updated in a verifiable manner. There are two kinds of TRC updates: regular and sensitive updates. A <em>regular</em> TRC update happens when the TRC's validity period expires. This period is defined by the <em>validity</em> parameter in the TRC. The default is one year. A TRC update is <em>sensitive</em> if and only if critical sections of the TRC are affected (for example, if the set of core ASes is modified). For both regular and sensitive TRC updates, a number of votes (in the form of signatures) must be cast to approve the update. This number of votes is dictated by the voting quorum and set in each TRC with the <em>voting quorum</em> parameter.</t>
        </section>
        <section anchor="dissemination-of-trc-updates">
          <name>Dissemination of TRC Updates</name>
          <t>Information about a TRC update is disseminated via the SCION's beaconing process, through the path-segment constructions beacons. Each PCB contains the version number of the currently active TRC. If an AS receives a PCB with a TRC version number higher than the locally stored TRC, it requests the PCB-sending AS for the new TRC. The new TRC is verified on the basis of the current one, and is accepted if it contains at least the required quorum of correct signatures by trust roots defined in the current TRC.
This simple dissemination mechanism has two advantages: It is very efficient (as fresh PCBs rapidly reach all ASes), and it avoids circular dependencies with regard to the verification of PCBs and the beaconing process itself (as no server needs to be contacted over unknown paths in order to fetch the updated TRC).</t>
        </section>
        <section anchor="grace-period">
          <name>Grace Period</name>
          <t>At most two TRCs per ISD can be active at the same time. The TRC parameter <em>grace period</em> indicates for how long the currently active TRC can still be active after a new TRC is disseminated. This so-called <strong>grace period</strong> starts at the beginning of the validity period of the new TRC. An older TRC can only be active until either (1) the grace period has passed, or (2) yet a newer TRC is announced. AS certificates are validated by following the chain of trust up to an active TRC.</t>
        </section>
        <section anchor="revocation-and-recovery-from-a-catastrophic-event">
          <name>Revocation and Recovery from a Catastrophic Event</name>
          <t>The TRC dissemination mechanism also enables rapid revocation of trust roots. When a trust root is compromised, the other trust roots can remove it from the TRC and disseminate a new TRC alongside a PCB with a new version number.</t>
          <t>In case of a catastrophic event--such as several private root keys being disclosed due to a critical vulnerability in a cryptographic library--SCION is equipped with a recovery procedure called <strong>trust reset</strong>. This procedure consists of creating a new TRC with fresh, trustworthy keys (and potentially new algorithms), and redistributing this TRC out-of-band. A trust reset effectively establishes a new base TRC for the ISD. It is possible for ISDs to disable trust resets by setting the <em>no trust reset</em> Boolean parameter to "true" in their TRC, with the effect that the entire ISD would have to be abandoned in the event of such a catastrophic compromise (this abandonment would also have to be announced out-of-band).</t>
          <t>The partition of the SCION network into ISDs guarantees that no single entity can take down the entire network. Even if several entities formed a coalition to carry out an attack, the effects of that attack would be limited to one or a few ISDs.</t>
        </section>
      </section>
      <section anchor="scion-control-plane">
        <name>SCION Control Plane</name>
        <t>The SCION control plane is responsible for discovering path segments and making them available to end hosts. This process includes path exploration, registration, and lookup; it involves the path service, beacon service, and certificate service, both in core ASes and non-core ASes.</t>
        <t><strong>Note</strong>: This section describes the SCION control plane on a very high level. A much more detailed description of SCION's control plane will follow in a separate internet draft.</t>
        <section anchor="path-exploration">
          <name>Path Exploration</name>
          <t>In SCION, the path segment construction process is referred to as <strong>beaconing</strong>. The <em>beacon service</em> of each AS is responsible for the beaconing process. The beacon service generates, receives, and propagates the <strong>path-segment construction beacons (PCBs)</strong> on a regular basis, to iteratively construct path segments.</t>
          <t>There are three types of path segments (note that all path segments can be used to send data traffic in both directions):</t>
          <ul spacing="normal">
            <li>A path segment from a non-core AS to a core AS is an <em>up-path segment</em>.</li>
            <li>A path segment from a core AS to a non-core AS is a <em>down-path segment</em>.</li>
            <li>A path segment between core ASes is a <em>core-path segment</em>.</li>
          </ul>
          <t>All path segments are invertible: A core-path segment can be used bidirectional, and an up-path segment can be converted into a down-path segment, or vice versa, depending on the direction of the end-to-end path.</t>
          <t>Path segment construction is conducted hierarchically on two levels:</t>
          <ul spacing="normal">
            <li>
              <em>Core beaconing</em> is the process of constructing path segments between core ASes. During core beaconing, the beacon service of a core AS either initiates PCBs or propagates PCBs received from neighboring core ASes to all other neighboring core ASes. Core beaconing in SCION is similar to BGP's route-advertising process, although in SCION the process is periodic and PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>
              <em>Intra-ISD beaconing</em> creates path segments from core ASes to non-core ASes. For this, the beacon service of a core AS creates PCBs and sends them to the non-core child ASes (typically customer ASes). The beacon service of a non-core child AS receives these PCBs and forwards them to its child ASes, and so on. This procedure continues until the PCB reaches an AS without any customer (leaf AS). As a result, all ASes receive path segments to reach the core ASes of their ISD.</li>
          </ul>
          <t>On its way down, a PCB accumulates cryptographically protected path- and forwarding information per traversed AS. At every AS, metadata as well as information about the AS's ingress and egress interfaces (i.e., link identifiers) is added to the PCB. The ingress and egress interface IDs identify connections to neighboring ASes. These IDs only need to be unique within each AS. Therefore, they can be chosen and encoded by each AS independently and without any need for coordination.</t>
          <t>SCION also supports shortcuts and peering links. In a <em>shortcut</em>, a path only contains an up-path and a down-path segment, which can cross over at a non-core AS that is common to both paths. <em>Peering links</em> can be added to up- or down-path segments, resulting in an operation similar to today's Internet.</t>
          <t>To reduce beaconing overhead and prevent possible forwarding loops, PCBs do not traverse peering links. Instead, peering links are announced along with a regular path in a PCB. If the path segments of both ASes at the end of a peering link contain this peering link, then it is possible to use the peering link to shortcut the end-to-end path (i.e., without going through the core). SCION also supports peering links that cross ISD boundaries, according to SCION's path transparency property: A source knows the exact set of ASes and ISDs traversed during the delivery of a packet.
COMMENT: maybe last sentence can be omitted? it is not really specific to peering links</t>
          <t><xref target="pcb"/> shows how intra-ISD PCB propagation works, from the ISD's core AS down to child ASes. For the sake of illustration, the interfaces of each AS are numbered with integer values. In practice, each AS can choose any encoding for its interfaces; in fact, only the AS itself needs to understand its encoding. Here, AS F receives two different PCBs via two different links from core AS X. Moreover, AS F uses two different links to send two different PCBs to AS G, each containing the respective egress interfaces. AS G extends the two PCBs and forwards both of them over a single link to a child AS.</t>
          <figure anchor="pcb">
            <name>Intra-ISD PCB propagation from the ISD core down to child ASes</name>
            <artwork><![CDATA[
                                  .-----.
                                 ; Core  :
                        +-----+  : AS X  ;
                        |PCB  |   \ 2 1 / +-----+
                        |Core |    `+-+'  |pcb  |
                        |Out:2|     | |   |core |
                        +--+--+   +-+ |   |out:1|
                           |      |   |   +--+--+
                           v      |   |      |
                                .-+---+.     v
                   .---.       /  2   3 \             .---.
                  (  J  )- - -; 1      4 :- - - - - -(  H  )
                   `---'      :   AS F   ;            `---'
                            +--\7       /
+----------+ +----------+ <-+     6  5
|PCB       | |pcb       |        `+--+'
|Core      | |core      |         |  |
|Out:2     | |out:1     |         |  |
|----------| |----------|         |  |
|AS F      | |as f      |         |  |
|In:2 Out:7| |in:3 out:7|         |  |
|Peer J:1  | |peer j:1  |         |  | +----------+ +----------+
|Peer H:4  | |peer h:4  |         |  | |PCB       | |pcb       |
|          | |          |         |  | |Core      | |core      |
+--+-------+ +--+-------+         |  | |Out:2     | |out:1     |
   |            |                 |  | |----------| |----------|
  <+           <+                 |  | |AS F      | |as f      |
                                  |  | |In:2 Out:5| |in:3 out:5|
         +----------+ +----------+|  | |Peer J:1  | |peer j:1  |
         |PCB       | |pcb       ||  | |Peer H:4  | |peer h:4  |
         |Core      | |core      ||  | |          | |          |
         |Out:2     | |out:1     ||  | +----+-----+ +----+-----+
         |----------| |----------||  |      |            |
         |AS F      | |as f      ||  |      v            v
         |In:2 Out:6| |in:3 out:6||  |
         |Peer J:1  | |peer j:1  ||  |
         |Peer H:4  | |peer h:4  ||  |
         |          | |          ||  |
         +----+-----+ +----+-----+|  |
              |            |     .+--+-.
              v            v   ,' 5  1  `.
                              ;           :
                              :   AS G    ;
                               \         /
                            +---` 4  3 ,'
                          <-+     `--+'
                                     |  +----------+ +----------+
                                     |  |PCB       | |pcb       |
                                     |  |Core      | |core      |
                                     |  |Out:2     | |out:1     |
           +----------+ +----------+ |  |----------| |----------|
           |PCB       | |pcb       | |  |AS F      | |as f      |
           |Core      | |core      | |  |In:2 Out:5| |in:3 out:5|
           |Out:2     | |out:1     | |  |Peer J:1  | |peer j:1  |
           |----------| |----------| |  |Peer H:4  | |peer h:4  |
           |AS F      | |as f      | |  |----------| |----------|
           |In:2 Out:6| |in:3 out:6| |  |AS G      | |as g      |
           |Peer J:1  | |peer j:1  | |  |In:1 Out:3| |in:1 out:3|
           |Peer H:4  | |peer h:4  | |  |          | |          |
           |----------| |----------| |  +----+-----+ +----+-----+
           |AS G      | |as g      | |       |            |
           |In:5 Out:3| |in:5 out:3| v       v            v
           |          | |          |
           +----+-----+ +----+-----+
                |            |
                v            v
]]></artwork>
          </figure>
          <section anchor="security">
            <name>Security</name>
            <t>Each PCB contains signatures of all on-path ASes. Every time a beacon service receives a PCB, it validates the PCB's authenticity. During this process, the beacon service can query the certificate service, for example, when it lacks an intermediate certificate.</t>
          </section>
          <section anchor="policies">
            <name>Policies</name>
            <t>Each AS can independently set policies dictating which PCBs are sent in which time intervals, and to which neighbors. In particular, PCBs do not need to be propagated immediately upon arrival. However, during bootstrapping and if the AS obtains a PCB containing a previously unknown path, the AS should forward the PCB immediately, to ensure quick connectivity establishment.</t>
          </section>
        </section>
        <section anchor="path-registration">
          <name>Path Registration</name>
          <t>Both the beacon service and the path service are involved in the path registration process. A non-core AS typically receives several PCBs representing several path segments to various core ASes. Out of these PCBs, the non-core AS must select those down-path segments through which it wants to be reached. It is the task of the AS's beacon service to make this selection, according to the criteria described in <xref target="selection">Path-Segment Selection</xref>. The beacon service then registers these path segments both at the local path service and at the path service of all core ASes. When links fail, segments expire, or better segments become available, the beacon service updates the down-path segments registered for its AS.</t>
          <t>As a result, a core AS's path service contains all intra-ISD path segments registered by the leaf ASes of its ISD. In addition, a core AS path service also stores the preferred core-path segments to other core ASes.</t>
          <section anchor="selection">
            <name>Path-Segment Selection</name>
            <t>Among the received PCBs, the beacon service of an AS must choose (1) a set of PCBs to propagate further, and (2) a set of path segments to register. The selection of these PCBs and path segments is based on a path quality metric. This metric aims at identifying consistent, diverse, efficient, and policy-compliant paths:</t>
            <ul spacing="normal">
              <li>
                <em>Consistency</em> implies that at least one property along the path is uniform, such as an AS capability (e.g., high bandwidth).</li>
              <li>
                <em>Diversity</em> means that the set of paths announced over time are as path-disjoint as possible, in order to provide high-quality multipath options.</li>
              <li>
                <em>Efficiency</em> refers to the length, bandwidth, latency, utilization, and availability of a path, where more efficient paths are naturally preferred.</li>
              <li>
                <em>Policy compliance</em> implies that the path adheres to the AS's routing policy.</li>
            </ul>
            <t>Based on past PCBs, the AS beacon service assigns scores to the current set of candidate path segments, and sends the best segments in the next beaconing interval.</t>
            <t>Core beaconing operates similarly to intra-ISD beaconing, except that core PCBs only traverse core ASes. The same path selection metrics apply, where a core AS attempts to forward the set of most desirable paths to its neighbors.</t>
          </section>
        </section>
        <section anchor="path-lookup">
          <name>Path Lookup</name>
          <t>An end host (source) who wants to start communication with another host (destination), requires up to three path segments: An up-path segment to reach the ISD core, a core-path segment to reach the destination ISD, and a down-path segment to reach the destination AS. The source host queries the path service in its AS for such segments. The path service has up-path segments stored in its database and furthermore checks if it has appropriate core- and down-path segments in its cache; in this case it returns them immediately.</t>
          <t>If not, the path service in the source AS queries core path services (using locally stored up-path segments) in the source ISD for core-path segments to the destination ISD. Then, it combines up-path segments with the newly retrieved core-path segments, and queries core path services in the remote ISD to fetch remote down-path segments. To improve overall efficiency, the local path service caches the returned path segments and uses parallelism when requesting path segments from core path services. Finally, the local path service returns all path segments to the source host.</t>
          <t>This recursive lookup significantly simplifies the process for end hosts (which only have to send a single query, similar to stub DNS resolvers). The caching strategy ensures that path lookups are fast for frequently used destinations (similar to caching in recursive DNS resolvers).</t>
        </section>
        <section anchor="link-failures">
          <name>Link Failures</name>
          <t>Unlike in the current Internet, link failures are not automatically resolved by the network, but require active handling by end hosts. Since SCION forwarding paths are static, they break when one of the links fails. Link failures are handled by a two-pronged approach that typically masks link failures without any outage to the application and rapidly re-establishes fresh working paths:</t>
          <ul spacing="normal">
            <li>The SCION Control Message Protocol (SCMP) (the SCION equivalent of ICMP) is used for signaling connectivity problems. Instead of relying on application- or transport-layer timeouts, end hosts get immediate feedback from the network if a path stops working, and can quickly switch to an alternative path.</li>
            <li>SCION end hosts are encouraged to use multipath communication by default, thus masking a link failure with another working path. As multipath communication can increase availability (even in environments with very limited path choices), SCION beacon services attempt to create disjoint paths, SCION path services attempt to select and announce disjoint paths, and end hosts compose path segments to achieve maximum resilience to path failure. Consequently, most link failures in SCION remain unnoticed by the application, unlike the frequent (albeit mostly brief) outages in the current Internet. See also <xref target="ANDERSEN2001"/>, <xref target="KATZ2012"/>, <xref target="KUSHMAN2007"/>, and <xref target="HITZ2021"/>.</li>
          </ul>
        </section>
      </section>
      <section anchor="scion-data-plane">
        <name>SCION Data Plane</name>
        <t>While the control plane is responsible for providing end-to-end paths, the data plane ensures that packets are forwarded on the selected path. SCION border routers forward packets to the next AS based on the AS-level path in the packet header (which is extended with ingress and egress interface identifiers for each AS), without inspecting the destination address and also without consulting an inter-domain forwarding table. Only the border router at the destination AS needs to inspect the destination address to forward it to the appropriate local end host.</t>
        <t>Because SCION splits the information about the locator (the path towards the destination AS) and the identifier (the destination address), the identifier can have any format that the destination AS can interpret--only the destination needs to consider that local identifier (see also <xref target="RFC6830"/>). In other words, an AS can select an arbitrary addressing format for its hosts, e.g., a 4-byte IPv4, 6-byte media access control (MAC) address, 16-byte IPv6, or any other up to 16-byte addressing scheme. A valuable consequence is that hosts with different address types can directly communicate.</t>
        <t>The next two sections describe how an end host combines path segments into an end-to-end forwarding path, and how border routers forward packets efficiently.</t>
        <t><strong>Note</strong>: This section describes the SCION data plane on a very high level. A much more detailed description of SCION's data plane will follow in a separate internet draft.</t>
        <section anchor="path-construction-via-segment-combination">
          <name>Path Construction via Segment Combination</name>
          <t>Through the path lookup, the end host obtains path segments that must be combined into an end-to-end path. A valid SCION <strong>forwarding path</strong> can be created by combining up to three path segments, in the following ways:</t>
          <ul spacing="normal">
            <li>
              <strong>Immediate combination of path segments</strong>: The last AS on the up-path segment is also the first AS on the down-path segment. In this case, the simple combination of an up-path segment and a down-path segment creates a valid forwarding path.</li>
            <li>
              <strong>AS shortcut</strong>: The up-path segment and down-path segment intersect at a non-core AS. In this case, a shorter forwarding path can be created by removing the extraneous part of the path.</li>
            <li>
              <strong>Peering shortcut</strong>: A peering link exists between the two segments, so a shortcut via the peering link is possible. As in the AS shortcut case, the extraneous path segment is cut off. The peering link could be traversing to a different ISD.</li>
            <li>
              <strong>Combination with a core-path segment</strong>: The last AS on the up-path segment is different from the first AS on the down-path segment. This case requires an additional core-path segment to connect the up- and down-path segment. If the communication remains within the same ISD, a local ISD core-path segment is needed; otherwise, an inter-ISD core-path segment is required.</li>
            <li>
              <strong>On-path</strong>: The destination AS is part of the up-path segment or the source AS is part of the down-path segment; in this case, a single up- or down-path segment, respectively, is sufficient to create a forwarding path.</li>
          </ul>
          <t>Once a forwarding path is chosen, it is encoded in the SCION packet header. This makes inter-domain routing tables unnecessary for border routers: Both the ingress and the egress interface of each AS on the path are encoded as <strong>packet-carried forwarding state (PCFS)</strong> in the packet header. The destination can respond to the source by reversing the end-to-end path from the packet header, or it can perform its own path lookup and combination.</t>
          <t>The SCION packet header contains of a sequence of <strong>hop fields (HFs)</strong>, one HF for each AS that is traversed on the end-to-end path. Each hop field contains the encoded numbers of the ingress and egress links, and thus defines which interfaces may be used to enter and leave an AS. In addition to the hop fields, each path segment contains an <strong>info field (INF)</strong> with basic information about the segment. A host can create an end-to-end forwarding path by extracting info fields and hop fields from path segments, as depicted in <xref target="HFs"/>. The additional meta header (META) contains pointers to the currently active INF and HF.</t>
          <figure anchor="HFs">
            <name>Combining three path segments into a forwarding path</name>
            <artwork><![CDATA[
up-path segment        core-path segment        down-path segment

+-------+              +-------+                +-------+
|+-----+|              |+-----+|                |+-----+|
|+ INF ||----------+   |+ INF ||---+            |+ INF ||-+
|+-----+|          |   |+-----+|   |            |+-----+| |
|+-----+|          |   |+-----+|   |            |+-----+| |
|| hf  ||--------+ |   || hf  ||---+--+         || hf  ||-+--+
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|| hf  ||-----+  | |   || hf  ||---+--+--+      || hf  ||-+--+--+
|+-----+|     |  | |   |+-----+|   |  |  |      |+-----+| |  |  |
|+-----+|     |  | |   +-------+   |  |  |      +-------+ |  |  |
|| hf  ||--+  |  | |               |  |  |                |  |  |
|+-----+|  |  |  | |   +--------+  |  |  |                |  |  |
+-------+  |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |++ Meta||  |  |  |                |  |  |
           |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |+-----+ |  |  |  |                |  |  |
           |  |  | +-->|+ INF | |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+ INF | |<-+  |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+ INF | |<----+--+----------------+  |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  +---->|| hf  | |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  +------->|| hf  | |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           +---------->|| hf  | |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       || hf  | |<----+  |                   |  |
                       |+-----+ |        |                   |  |
                       |+-----+ |        |                   |  |
                       || hf  | |<-------+                   |  |
                       |+-----+ |                            |  |
                       |+-----+ |                            |  |
                       || hf  | |<---------------------------+  |
                       |+-----+ |                               |
                       |+-----+ |                               |
                       || hf  | |<------------------------------+
                       |+-----+ |
                       +--------+
                     forwarding path
]]></artwork>
          </figure>
        </section>
        <section anchor="path-authorization">
          <name>Path Authorization</name>
          <t>It is crucial for the data plane that end hosts only use paths constructed and authorized by ASes in the control plane. In particular, end hosts should not be able to craft HFs themselves, modify HFs in authorized path segments, or combine HFs of different path segments (path splicing). This property is called <strong>path authorization</strong> (see <xref target="KLENZE2021"/> and <xref target="LEGNER2020"/>.</t>
          <t>SCION achieves path authorization by creating message-authentication codes (MACs) during the beaconing process. Each AS calculates these MACs using a local secret key (that is only shared between SCION infrastructure elements within the AS) and chains them to the previous HFs. The MACs are then included in the forwarding path as part of the respective HFs.</t>
        </section>
        <section anchor="forwarding">
          <name>Forwarding</name>
          <t>Routers can efficiently forward packets in the SCION architecture. In particular, the absence of inter-domain routing tables and of complex longest-IP-prefix matching performed by current routers enables the construction of more efficient routers.</t>
          <t>During packet forwarding, a SCION border router at the ingress point of the AS verifies that:</t>
          <ul spacing="normal">
            <li>the packet entered through the correct ingress interface corresponding to the information in the HF,</li>
            <li>the HF is still valid, and</li>
            <li>the MAC in the HF is correct.</li>
          </ul>
          <t>If the packet has not yet reached the destination AS, the egress interface number in the HF of the non-destination AS refers to the egress SCION border router of this AS. In this case, the packet can be sent from the ingress SCION border router to the egress SCION border router via native intra-domain forwarding (e.g., IP or MPLS). In case the packet has arrived at the destination AS, the destination AS's border router inspects the destination address and sends the packet to the corresponding host.</t>
        </section>
        <section anchor="intra-as-communication">
          <name>Intra-AS Communication</name>
          <t>SCION routers use IP to communicate within an AS, therefore they rely on existing intra-domain routing protocols, such as Multiprotocol Label Switching (MPLS) or others.</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment</name>
      <t>Adoption of a next-generation architecture is a challenging task, as it needs to be integrated with, and operate alongside existing infrastructure. SCION is designed to coexist with existing intra-domain routing infrastructure, and comprises coexistence and transition mechanisms that facilitate adoption, in accordance to principles defined in <xref target="RFC8170"/>.
The following section discusses practical considerations for deploying SCION and briefly touches on some of the transition mechanisms, with focus on:</t>
      <ul spacing="normal">
        <li>
          <xref target="deployment-as">Autonomous Systems</xref>,</li>
        <li>
          <xref target="deployment-ixp">Internet Exchange Points</xref>, and</li>
        <li>
          <xref target="deployment-end-host">end hosts</xref>, covering both native SCION hosts and SCION to IP encapsulation.</li>
      </ul>
      <t>We then describe some of the early adopters deployment experiences. A more detailed adoption plan is to be outlined in dedicated documents.</t>
      <section anchor="deployment-as">
        <name>Autonomous System Deployment</name>
        <t>A SCION AS needs to deploy the SCION <xref target="infra-components">infrastructure components</xref> and border routers.
Within an AS, SCION is often deployed as an IP overlay on top of the existing network. This way SCION allows to reuse the existing intra-domain network and equipment (e.g., IP, MPLS). Customer-side SCION border routers directly connect to the provider-side border routers using last-mile connections. The SCION design assumes that AS's internal entities are considered to be trustworthy, therefore the IP overlay or the first-hop routing does not compromise or degrade any security properties SCION delivers.
When it comes to inter-domain communication, an overlay deployment on top of today's Internet is not desirable, as SCION would inherit issues from  its weak underlay. Thus, inter-AS SCION links are usually deployed in parallel to existing links, in order to preserve its security properties. That is, two SCION border routers from neighbour ASes are directly connected via a layer-2 cross-connection at a common point-of-presence.</t>
        <t>All SCION AS components can be deployed on standard x86 commercial off-the-shelf servers or virtual machines. In fact, SCION border routers do not rely on forwarding tables, therefore they do not require specialized hardware. Practice shows that off-the-shelf hardware can handle up to 100 Gbps links, while a prototype <xref target="DERUITER2021">P4 implementation</xref> showed that it is possible to forward SCION traffic even at terabit speeds.</t>
        <t>Overall, an AS can be connected to SCION without high-impact changes to its network. In addition, use of commodity hardware for both control and data-plane components reduces initial deployment costs.</t>
      </section>
      <section anchor="deployment-ixp">
        <name>Internet Exchange Points</name>
        <t>Internet Exchange Points (IXP) play as important a role for SCION as they do in today's Internet.  SCION can be deployed at existing IXPs following a "big switch" model, where the IXP provides a large L2 switch between multiple SCION ASes. SCION has been deployed following this model at the Swiss Internet Exchange (SwissIX),  currently interconnecting major SCION Swiss ISPs and enterprises through bi-lateral peering over dedicated SCION ports.</t>
        <t>Additionally, thanks to its path-awareness, SCION offers the option of an enhanced deployment model, i.e., to expose the internal topology of an IXP within the SCION control plane. This enables IXP customers to use SCION's multi-path and fast failover capabilities to leverage the IXP's internal links (including backup links) and to select paths depending on the application's needs.  IXPs have therefore an incentive to expose their rich internal connectivity, as the benefits from SCION's multi-path capabilities would increase their value for customers and provide them with a competitive advantage.</t>
      </section>
      <section anchor="deployment-end-host">
        <name>End Hosts and Incremental Deployability</name>
        <t>End users can leverage SCION in two different ways: (1) using SCION-aware applications on a <xref target="native-endhost">SCION native end host</xref>, or (2) using transparent <xref target="sig">IP-to-SCION conversion</xref>. The benefit of using SCION natively is that the full range of advantages becomes available to applications, at the cost of installing the SCION endpoint stack and making the application SCION-aware. In early deployments, the second approach is often preferred, so that no changes are needed within applications or end hosts.</t>
        <section anchor="native-endhost">
          <name>Native End Hosts</name>
          <t>A SCION native end host's stack consists of a dispatcher, which handles all incoming and outgoing SCION packets, and of a SCION daemon, which handles control-plane messages. The latter  fetches paths to remote ASes and provides an API for applications and libraries to interact with the SCION control plane (i.e., for path lookup, SCION extensions). The current SCION implementation uses an UDP/IP underlay for communication between end hosts and SCION routers. This allows reuse of existing intra-domain networking infrastructure. SCION end hosts can optionally use automated bootstrapping mechanisms to retrieve configuration from the network and establish SCION connectivity. This way, clients require no pre-existing network-specific configurations.</t>
        </section>
        <section anchor="sig">
          <name>SCION to IP Gateway (SIG)</name>
          <t>A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
A SIG can be deployed close to the end user (i.e., at branches of an enterprise, on a CPE), or within an ISP's network. In the latter case, the SIG is called carrier-grade SIG, as it serves multiple customers within the AS where it is deployed. This approach has the advantage that it does not require any changes at the customer's premises.
In order to allow incremental deployability and to ease transition from legacy IP-based Internet to SCION, SIGs can be augmented with  mechanisms allowing them to coordinate and automatically exchange IP prefix information. A more detailed description of the SIG and its coordination mechanisms is to be presented in dedicated documents.</t>
        </section>
      </section>
      <section anchor="deploy">
        <name>Deployment Experiences</name>
        <t>SCION has been deployed in production by multiple entities, growing its acceptance among industry. While early deployments started on academic and research networks, SCION has expanded to serve the financial industry, government, and it is being evaluated for the healthcare sector.</t>
        <t>In 2017, SCION was evaluated for production use by a central bank, with the goal of modernising the network interconnecting banks and their branches. SCION was chosen, as it allows moving away from a dedicated private network to a reliable Internet-based solution. SCION connectivity was later extended to support system-critical applications, like the national real-time gross settlement (RTGS) system, connecting all country's banks to exchange real-time payment information.
The network, called Secure Swiss Finance Network or <eref target="https://perma.cc/PU5L-ALPM">SSFN</eref>, is implemented as a SCION ISD, where a federation of three ISPs forms the ISD core.
Financial institutions are themselves SCION ASes and directly connect to one or more of the core ASes. Institutions deploy SCION-IP gateways (SIGs), transparently enabling their traditional IP-based applications to use the SCION network.
The concept of the SCION ISD also provides a mechanism to implement strict governance and access control (through the issuance of AS certificates).</t>
        <t>Besides the SSFN, SCION connectivity has also been adopted by government entities for their international communications. In addition, Swiss higher education institutions are connected thanks to the <eref target="http://scied.scion-architecture.net/">SCI-ED</eref> network.</t>
        <t>In addition to productive deployments, SCION also comprises a global SCION research testbed called <eref target="https://www.scionlab.org">SCIONLab</eref>. It is composed of dozens of globally distributed infrastructure ASes, mostly run by academic institutions. The testbed is open to any user who can easily set up their own AS with the aid of a web-based UI, connect to the network, and run experiments. The setup has been the earliest global deployment of SCION and it has been supporting research and development of path-aware networking and SCION.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently, this document has no request for action to IANA.
However, when full specification of SCION is available, requests for IANA actions are expected regarding the registration of optional packet header fields as well as the coordination of SCION ISD and AS number assignments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCION has been designed from the outset to offer security by default, and thus there are manifold security considerations. As a matter of fact, SCION's protocol design has been formally verified and the open source router implementation is undergoing formal verification (see also <xref target="KLENZE2021"/>). Describing all security considerations here, therefore, would go beyond the scope of this document. A separate document including all security implications and considerations will follow later.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4264">
          <front>
            <title>BGP Wedgies</title>
            <author fullname="T. Griffin" initials="T." surname="Griffin">
              <organization/>
            </author>
            <author fullname="G. Huston" initials="G." surname="Huston">
              <organization/>
            </author>
            <date month="November" year="2005"/>
            <abstract>
              <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner.  In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable.  Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies".  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4264"/>
          <seriesInfo name="DOI" value="10.17487/RFC4264"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski">
              <organization/>
            </author>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.   This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6830">
          <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci">
              <organization/>
            </author>
            <author fullname="V. Fuller" initials="V." surname="Fuller">
              <organization/>
            </author>
            <author fullname="D. Meyer" initials="D." surname="Meyer">
              <organization/>
            </author>
            <author fullname="D. Lewis" initials="D." surname="Lewis">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
              <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6830"/>
          <seriesInfo name="DOI" value="10.17487/RFC6830"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski">
              <organization/>
            </author>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram">
              <organization/>
            </author>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes.  BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message.  The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9049">
          <front>
            <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
            <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
              <t>This document contains that catalog and analysis.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9049"/>
          <seriesInfo name="DOI" value="10.17487/RFC9049"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol.  Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult.  This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="SCHUCHARD2011">
          <front>
            <title>Losing control of the internet: using the data plane to attack the control plane</title>
            <author fullname="Max Schuchard" initials="M." surname="Schuchard">
              <organization/>
            </author>
            <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
              <organization/>
            </author>
            <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
              <organization/>
            </author>
            <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
              <organization/>
            </author>
            <author fullname="Yongdae Kim" initials="Y." surname="Kim">
              <organization/>
            </author>
            <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications security - CCS" value="'10"/>
          <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
        </reference>
        <reference anchor="LABOVITZ2000">
          <front>
            <title>Delayed Internet routing convergence</title>
            <author fullname="Craig Labovitz" initials="C." surname="Labovitz">
              <organization/>
            </author>
            <author fullname="Abha Ahuja" initials="A." surname="Ahuja">
              <organization/>
            </author>
            <author fullname="Abhijit Bose" initials="A." surname="Bose">
              <organization/>
            </author>
            <author fullname="Farnam Jahanian" initials="F." surname="Jahanian">
              <organization/>
            </author>
            <date year="2000"/>
          </front>
          <seriesInfo name="Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication - SIGCOMM" value="'00"/>
          <seriesInfo name="DOI" value="10.1145/347059.347428"/>
        </reference>
        <reference anchor="GRIFFIN1999">
          <front>
            <title>An analysis of BGP convergence properties</title>
            <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
              <organization/>
            </author>
            <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
              <organization/>
            </author>
            <date month="October" year="1999"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 29, pp. 277-288"/>
          <seriesInfo name="DOI" value="10.1145/316194.316231"/>
        </reference>
        <reference anchor="SAHOO2009">
          <front>
            <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
            <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
              <organization/>
            </author>
            <author fullname="Krishna Kant" initials="K." surname="Kant">
              <organization/>
            </author>
            <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
          </front>
          <seriesInfo name="Computer Communications" value="Vol. 32, pp. 1207-1218"/>
          <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
        </reference>
        <reference anchor="LYCHEV2013">
          <front>
            <title>BGP security in partial deployment: is the juice worth the squeeze?</title>
            <author fullname="Robert Lychev" initials="R." surname="Lychev">
              <organization/>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization/>
            </author>
            <author fullname="Michael Schapira" initials="M." surname="Schapira">
              <organization/>
            </author>
            <date month="September" year="2013"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 43, pp. 171-182"/>
          <seriesInfo name="DOI" value="10.1145/2534169.2486010"/>
        </reference>
        <reference anchor="LI2014">
          <front>
            <title>Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?</title>
            <author fullname="Qi Li" initials="Q." surname="Li">
              <organization/>
            </author>
            <author fullname="Yi-Chun Hu" initials="Y." surname="Hu">
              <organization/>
            </author>
            <author fullname="Xinwen Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <seriesInfo name="Proceedings 2014 Workshop on Security of Emerging Networking" value="Technologies"/>
          <seriesInfo name="DOI" value="10.14722/sent.2014.23001"/>
        </reference>
        <reference anchor="COOPER2013">
          <front>
            <title>On the risk of misbehaving RPKI authorities</title>
            <author fullname="Danny Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="Ethan Heilman" initials="E." surname="Heilman">
              <organization/>
            </author>
            <author fullname="Kyle Brogle" initials="K." surname="Brogle">
              <organization/>
            </author>
            <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
              <organization/>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization/>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
        </reference>
        <reference anchor="ROTHENBERGER2017">
          <front>
            <title>Internet Kill Switches Demystified</title>
            <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
              <organization/>
            </author>
            <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
              <organization/>
            </author>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization/>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization/>
            </author>
            <date month="April" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
        </reference>
        <reference anchor="MORILLO2021">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking</title>
            <author fullname="Reynaldo Morillo" initials="R." surname="Morillo">
              <organization/>
            </author>
            <author fullname="Justin Furuness" initials="J." surname="Furuness">
              <organization/>
            </author>
            <author fullname="Cameron Morris" initials="C." surname="Morris">
              <organization/>
            </author>
            <author fullname="James Breslin" initials="J." surname="Breslin">
              <organization/>
            </author>
            <author fullname="Amir Herzberg" initials="A." surname="Herzberg">
              <organization/>
            </author>
            <author fullname="Bing Wang" initials="B." surname="Wang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="Proceedings 2021 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
        </reference>
        <reference anchor="KLENZE2021">
          <front>
            <title>Formal Verification of Secure Forwarding Protocols</title>
            <author fullname="Tobias Klenze" initials="T." surname="Klenze">
              <organization/>
            </author>
            <author fullname="Christoph Sprenger" initials="C." surname="Sprenger">
              <organization/>
            </author>
            <author fullname="David Basin" initials="D." surname="Basin">
              <organization/>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 IEEE 34th Computer Security Foundations Symposium" value="(CSF)"/>
          <seriesInfo name="DOI" value="10.1109/csf51468.2021.00018"/>
        </reference>
        <reference anchor="DERUITER2021">
          <front>
            <title>Next-generation internet at terabit speed: SCION in P4</title>
            <author fullname="Joeri de Ruiter" initials="J." surname="de Ruiter">
              <organization/>
            </author>
            <author fullname="Caspar Schutijser" initials="C." surname="Schutijser">
              <organization/>
            </author>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="Proceedings of the 17th International Conference on emerging Networking EXperiments and" value="Technologies"/>
          <seriesInfo name="DOI" value="10.1145/3485983.3494839"/>
        </reference>
        <reference anchor="ANDERSEN2001">
          <front>
            <title>Resilient overlay networks</title>
            <author fullname="David Andersen" initials="D." surname="Andersen">
              <organization/>
            </author>
            <author fullname="Hari Balakrishnan" initials="H." surname="Balakrishnan">
              <organization/>
            </author>
            <author fullname="Frans Kaashoek" initials="F." surname="Kaashoek">
              <organization/>
            </author>
            <author fullname="Robert Morris" initials="R." surname="Morris">
              <organization/>
            </author>
            <date month="October" year="2001"/>
          </front>
          <seriesInfo name="Proceedings of the eighteenth ACM symposium on Operating systems" value="principles"/>
          <seriesInfo name="DOI" value="10.1145/502034.502048"/>
        </reference>
        <reference anchor="KATZ2012">
          <front>
            <title>LIFEGUARD: practical repair of persistent route failures</title>
            <author fullname="Ethan Katz-Bassett" initials="E." surname="Katz-Bassett">
              <organization/>
            </author>
            <author fullname="Colin Scott" initials="C." surname="Scott">
              <organization/>
            </author>
            <author fullname="David R. Choffnes" initials="D." surname="Choffnes">
              <organization/>
            </author>
            <author fullname="Ítalo Cunha" initials="Í." surname="Cunha">
              <organization/>
            </author>
            <author fullname="Vytautas Valancius" initials="V." surname="Valancius">
              <organization/>
            </author>
            <author fullname="Nick Feamster" initials="N." surname="Feamster">
              <organization/>
            </author>
            <author fullname="Harsha V. Madhyastha" initials="H." surname="Madhyastha">
              <organization/>
            </author>
            <author fullname="Thomas Anderson" initials="T." surname="Anderson">
              <organization/>
            </author>
            <author fullname="Arvind Krishnamurthy" initials="A." surname="Krishnamurthy">
              <organization/>
            </author>
            <date month="September" year="2012"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 42, pp. 395-406"/>
          <seriesInfo name="DOI" value="10.1145/2377677.2377756"/>
        </reference>
        <reference anchor="KUSHMAN2007">
          <front>
            <title>Can you hear me now?!: it must be BGP</title>
            <author fullname="Nate Kushman" initials="N." surname="Kushman">
              <organization/>
            </author>
            <author fullname="Srikanth Kandula" initials="S." surname="Kandula">
              <organization/>
            </author>
            <author fullname="Dina Katabi" initials="D." surname="Katabi">
              <organization/>
            </author>
            <date month="March" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 37, pp. 75-84"/>
          <seriesInfo name="DOI" value="10.1145/1232919.1232927"/>
        </reference>
        <reference anchor="PERRIG2017" target="https://doi.org/10.1007/978-3-319-67080-5">
          <front>
            <title>SCION: A Secure Internet Architecture</title>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="P." surname="Szalachowski" fullname="Pawel Szalachowski">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="R." surname="Reischuk" fullname="Raphael Reischuk">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-319-67079-9"/>
        </reference>
        <reference anchor="KING2022" target="https://datatracker.ietf.org/doc/draft-king-irtf-challenges-in-routing/">
          <front>
            <title>Challenges for the Internet Routing Systems Introduced by Semantic Routing</title>
            <author initials="D." surname="King" fullname="Daniel King">
              <organization>Lancaster University</organization>
            </author>
            <author initials="A." surname="Farrel" fullname="Adrian Farrel">
              <organization>Old Dog consulting</organization>
            </author>
            <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
              <organization>Orange</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="HITZ2021" target="https://perma.cc/4H3Q-WZNG">
          <front>
            <title>Demonstrating the reliability and resilience of Secure Swiss Finance Network</title>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://www.usenix.org/conference/usenixsecurity20/presentation/legner">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Cyrill Kraehenbuehl and Juan A. Garcia-Pardo for reviewing this document. We are also indebted to Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter Mueller, for writing the book "The Complete Guide to SCION" (see <xref target="CHUAT22"/>), which provides the background information needed to write this informational draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
