<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-panrg-scion-overview-03" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="SCION I-D">SCION Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-03"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>cdk@scion.org</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="A." surname="Perrig" fullname="Adrian Perrig">
      <organization>ETH Zuerich</organization>
      <address>
        <email>adrian.perrig@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2023" month="March" day="07"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next-generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts.</t>
      <t>This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane.
A more detailed analysis of relationships and dependencies between components is available in <xref target="I-D.rustignoli-scion-components"/>.
As SCION is already in production use today, the document concludes with an overview of SCION deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-overview_I-D/draft-dekater-panrg-scion-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-overview_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Introduction section explores the motivation to develop SCION, followed by a short description of SCION's main elements. The sections after the Introduction provide further insight into SCION's key concepts and deployment scenarios. The document concludes with some concrete case studies where SCION has been successfully deployed in production.</t>
      <section anchor="why">
        <name>Why SCION - Motivation</name>
        <t>Since its inception, the Internet has continued to expand, encompassing new uses over time. The continuous expansion has brought many issues to light, including a lack of control, limitations in scalability, performance and security, occurrences of severe outages, weak fault isolation, and energy consumption. With the core focus on functionality and operation, the current Internet offers little protection against attacks such as spoofing, IP-address hijacking, denial-of-service, and combinations of these. For more background information, see <xref target="SCHUCHARD2011"/>, <xref target="LABOVITZ2000"/>, <xref target="GRIFFIN1999"/>, <xref target="SAHOO2009"/>, and <xref target="RFC4264"/>.</t>
        <t>There have been numerous initiatives to address the above issues. Although these initiatives have brought many improvements, concerns regarding security and scalability still remain. For more details, see, e.g., <xref target="RFC4033"/>, <xref target="RFC6480"/>, <xref target="RFC8205"/>, and <xref target="RFC8446"/>, as well as <xref target="LYCHEV2013"/>, <xref target="LI2014"/>, <xref target="COOPER2013"/>, <xref target="ROTHENBERGER2017"/>, <xref target="MORILLO2021"/>, and <xref target="KING2022"/>.</t>
        <t>As a consequence, today's Internet fails to fulfil many users' requirements. This especially pertains to the demands of enterprises globally exchanging sensitive information, such as financial institutions, healthcare providers, universities, multinationals, governments, critical and transportation infrastructure operators. These users require the Internet to be highly available at all times. They expect reliable operation of the global network also in case of failures. They need availability guarantees across multiple routing domains, even in the presence of attacks. They further want to rely on an Internet that can be multilaterally governed and is free from global kill-switches.</t>
        <t>SCION has been developed in order to meet the above-mentioned requirements. SCION aims to reach the following goals:</t>
        <ul spacing="normal">
          <li>Provide high-availability architecture (also in the presence of adversaries)</li>
          <li>Provide fast failover in the case of inter-domain link or router failures</li>
          <li>Prevent from IP-address hijacking, DoS, and other attacks</li>
          <li>Enable path transparency as well as application-specific path optimizations</li>
          <li>Improve the inter-domain control plane's scalability</li>
          <li>Prepare the Internet for tomorrow's applications, such as virtual reality, Internet of Things (IoT), and all other applications requiring high-performance connectivity.</li>
        </ul>
        <section anchor="scope-of-scion">
          <name>Scope of SCION</name>
          <t>The above section describes SCION's aspiration to improve <em>inter</em>-AS routing and to focus on providing end-to-end connectivity. However, SCION does not solve <em>intra</em>-AS routing issues, nor does it provide end-to-end payload encryption, and identity authentication. These topics, which are equally important for the Internet to perform well, lie outside the scope of SCION.</t>
        </section>
        <section anchor="practical-considerations-based-on-related-rfcs">
          <name>Practical Considerations Based on Related RFCs</name>
          <t>The SCION inter-domain routing concept has initially been developed by researchers of the ETH Zuerich <xref target="PERRIG2017"/>, and could in the meantime also gain attention and recognition in the international academic world. However, for an IT architecture to be successful, it must work well in practice, too. This section pays attention to the implementation considerations of a conceptual framework such as SCION in real life, on the basis of some RFCs exploring this topic. It also verifies in how far SCION meets the requirements mentioned and questions raised in these RFCs.</t>
          <section anchor="avoiding-pitfalls">
            <name>Avoiding Pitfalls</name>
            <t><xref target="RFC9049"/> describes why previous proposals to tackle some of the Internet's fundamental issues did not manage to succeed. SCION seems to avoid the pitfalls mentioned in that document. For example, SCION does not have to be adopted by the entire Internet to be effective: The routing architecture provides benefits already to early adapters. Even if only a small part of the global network works with SCION, adapters will still take advantage of using the SCION routing technology. Moreover, not only users of SCION benefit from it, also ISPs and operators benefit from deploying SCION: early deployments showed that providers can charge the use of SCION as premium connectivity, with users who are willing to pay for it. Furthermore, SCION can be installed on top of and function alongside the existing routing infrastructure and protocols--there is no need for high-impact changes in an operational network.</t>
            <t>Another RFC that must be mentioned in this context is <xref target="RFC5218"/>, "What Makes for a Successful Protocol?". SCION seems to fulfil most factors that contribute to the success of a protocol, as described in section 2.1 of the RFC. This includes such factors as offering a positive net value (i.e., the benefits of deploying SCION outweigh the costs), incremental deployability, and open source code availability. More importantly, SCION averts the failure criteria mentioned in section 1.4 of the RFC: SCION is already deployed and in use by many actors of the Swiss financial and academic ecosystems, and allows for multiple implementations, both open and closed source. As existing SCION implementations are easily portable, adoption in mainstream platforms is also possible.</t>
          </section>
          <section anchor="answering-questions">
            <name>Answering Questions</name>
            <t>SCION can be considered a <em>path-aware internetworking</em> architecture, as described in <xref target="RFC9217"/>. This RFC poses (open) questions that must be answered in order to realize such a path-aware networking system. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            <t>SCION intends to answer the questions raised in this RFC. This especially pertains to the second, third, seventh, and eighth question:</t>
            <ul spacing="normal">
              <li>How do endpoints and applications get access to accurate, useful, and trustworthy path properties?</li>
              <li>How can endpoints select paths to use for traffic in a way that can be trusted by the network, the endpoints, and the applications using them?</li>
              <li>How can a path-aware network in a path-aware internetwork be effectively operated, given control inputs from network administrators, application designers, and end users?</li>
              <li>How can the incentives of network operators and end users be aligned to realize the vision of path-aware networking, and how can the transition from current ("path-oblivious") to path-aware networking be managed?</li>
            </ul>
            <t>SCION's answers to these questions can be found in <xref target="key">Key Concepts</xref> and <xref target="deploy">Deployments</xref>, respectively.</t>
          </section>
        </section>
        <section anchor="why-now">
          <name>Why Now?</name>
          <t>The emergence of multiple SCION implementations and early deployments highlights the need for standardization. The time seems therefore ripe to take SCION to the IETF, also in order to contribute to the important discussion regarding path-aware networking.</t>
        </section>
      </section>
      <section anchor="scion-overview">
        <name>SCION Overview</name>
        <t>SCION has been designed to address the fundamental issues of today's Internet depicted in <xref target="why">Why SCION - Motivation</xref>. The following section gives a high-level overview of SCION's main elements, providing a basic understanding of this next-generation inter-network architecture.</t>
        <section anchor="network-architecture-and-naming">
          <name>Network Architecture and Naming</name>
          <t>SCION's main goal is to offer highly available and efficient inter-domain packet delivery—even in the presence of actively malicious entities. To achieve scalability and sovereignty, SCION organizes existing ASes into groups of independent routing planes, called <strong>Isolation Domains (ISD)</strong>. An AS can be a member of multiple ISDs. All ASes in an ISD agree on a set of trust roots, called the <strong>Trust Root Configuration (TRC)</strong>. The ISD is governed by a set of <strong>core ASes</strong>, which provide connectivity to other ISDs and manage the trust roots. Typically, a few distinguished ASes within an ISD form the ISD’s core.</t>
          <t>Isolation domains serve the following purposes:</t>
          <ul spacing="normal">
            <li>They allow SCION to support trust heterogeneity, as each ISD can independently define its roots of trust;</li>
            <li>They provide transparency for trust relationships;</li>
            <li>They isolate the routing process within an ISD from external influences such as attacks and misconfigurations; and</li>
            <li>They improve the scalability of the routing protocol by separating it into a process within and one between ISDs.</li>
          </ul>
          <t>ISDs provide natural isolation of routing failures and misconfigurations, provide meaningful and enforceable trust, enable endpoints to optionally restrict traffic forwarding to trusted parts of the Internet infrastructure only, and enable scalable routing updates with high path-freshness.</t>
          <section anchor="links">
            <name>Links</name>
            <t>There are three types of links in SCION: core links, parent-child links, and peering links.</t>
            <ul spacing="normal">
              <li>A <strong>core link</strong> can only exist between two core ASes.</li>
              <li>A <strong>parent-child link</strong> requires that at least one of the two connected ASes is a non-core AS. ASes with a parent-child link usually belong to the same entity or have a provider-customer relationship.</li>
              <li>A <strong>peering link</strong> also includes at least one non-core AS.</li>
            </ul>
            <t>See <xref target="architecture"/> for a high-level overview of the SCION network structure.</t>
            <figure anchor="architecture">
              <name>SCION network structure</name>
              <artwork><![CDATA[
    ...............................
   :                               :
  :      [TRC]                      :
 :          (::::::::::::::)         :      ......................
:        (::::: ISD core :::::)       :    :                      :
:    (:: +---+ ::::::::: +---+ ::)    :   :    [TRC]               :
: (::::: |CAS|===+---+ : |CAS| :::::) :  :        (: ISD core :)    :
:    (:: +---+ : |CAS|===+---+====)===:==:=====(=+---+ :: +---+ :)  :
:       /(:::::: +---+ ::::::) \      :  :    (: |CAS| == |CAS| :)  :
:      /  (::::::: | :::::::)   \     :  :     ( +---+ :: +---+ )   :
:     /            |             o    :  :       /(::::::::::::)    :
:    o             |           +---+  :  :      /         \         :
:  +---+           |          /|ASb|  :  :     /           \        :
:  |ASa|           |         / +---+  :  :    o             o       :
:  +---+           |        /    |    :  :  +---+          +---+    :
:    |             |       /     |    :  :  |ASx| ---------|ASy|    :
:    |             |      /      o    :  :  +---+          +---+    :
:    o             o     /     +---+  :  :    |                     :
:  +---+         +---+  /      |ASe|  :  :    o                     :
:  |ASc|---------|ASd| o       +---+ -:--:--+---+                   :
:  +---+         +---+                :  :  |ASz|      ISD 2        :
 :                                   :    : +---+                  :
  :            ISD 1                :      ........................
   .................................
Legend:
                      |
                      |
Parent AS - child AS: o
Peering link: ----
Core link: ===
Core AS: CAS
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="routing">
          <name>Routing</name>
          <t>SCION operates on two routing levels: intra-ISD and inter-ISD. Both levels use <strong>path-segment construction beacons (PCBs)</strong> to explore network paths. A PCB is initiated by a core AS and then disseminated either within an ISD (to explore intra-ISD paths) or among core ASes (to explore core paths across different ISDs). The PCBs accumulate cryptographically protected path and forwarding information on AS-level, and store this information in the form of <strong>hop fields (HFs)</strong>. Endpoints use information from these hop fields to create end-to-end forwarding paths for data packets, who carry this information in their packet headers. This concept is called <strong>packet-carried forwarding state (PCFS)</strong>. The concept also supports multi-path communication among endpoints.</t>
          <t>The process of creating an end-to-end forwarding path consists of the following steps:</t>
          <ol spacing="normal" type="1"><li>First, an AS discovers paths to other ASes, during the <em>path exploration</em> (or beaconing) phase.</li>
            <li>The AS then selects a few PCBs according to defined policies, transforms the selected PCBs into path segments, and registers these segments with its path infrastructure, thus making them available to other ASes. This happens during the <em>path registration</em> phase.</li>
            <li>During the <em>path resolution</em> phase, the actual creation of an end-to-end forwarding path to the destination takes place. For this, an endpoint performs (a) a <em>path lookup</em> step, to obtain path segments, and (b) a <em>path combination</em> step, to combine the forwarding path from the segments.</li>
          </ol>
          <t><xref target="beaconing"/> below shows the SCION routing process in a nutshell.</t>
          <figure anchor="beaconing">
            <name>SCION routing in a nutshell</name>
            <artwork><![CDATA[
+------------------+             +------------------+
| Path Exploration |             |                  |
|   (Beaconing)    |------------>|Path Registration |
|                  |             |                  |
+------------------+             +--------+---------+
                                          |
                        +-----------------+
                        |
     +------------------v-----------------------+
     |            Path Resolution               |
     |+--------------+     +-------------------+|
     || Path Lookup  |---->| Path Combination  ||
     |+--------------+     +-------------------+|
     +------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="isd-and-as-numbering">
            <name>ISD and AS numbering</name>
            <t>SCION decouples endpoint addressing from inter-domain routing. Routing is based on the &lt;ISD, AS&gt; tuple, agnostic of endpoint addressing. Existing AS numbers are inherited from the current Internet, but a 48-bit namespace allows for additional SCION AS numbers beyond the 32-bit space in use today. The endpoint local address is not used for inter-domain routing or forwarding, does not need to be globally unique, and can thus be an IPv4, IPv6, or MAC address, for example. A SCION address is therefore composed of the &lt;ISD, AS, local address&gt; 3-tuple.</t>
          </section>
        </section>
        <section anchor="infra-components">
          <name>Infrastructure Components</name>
          <t>The <strong>beacon service</strong>, the <strong>path service</strong>, and the <strong>certificate service</strong> are the main control-plane infrastructure components within a SCION AS. Each service can be deployed redundantly, depending on the AS's size and type. Existing Internal routers are used to forward packets inside the AS, while <em>SCION border routers</em> provide interconnectivity between ASes.</t>
          <ul spacing="normal">
            <li>The <em>beacon service</em> discovers path information. It is responsible for generating, receiving, and propagating PCBs. Periodically, the beacon service generates a set of PCBs, which are forwarded to its child ASes or neighboring core ASes. The PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>The <em>path service</em> stores mappings from AS identifiers to sets of announced path segments. The path service is organized as a hierarchical caching system similar to that of DNS. Through the beacon service, ASes select the set of path segments through which they want to be reached, and they register them to the path service in the ISD core.</li>
            <li>The <em>certificate service</em> keeps cached copies of certificates and manages keys and certificates for securing inter-AS communication. The certificate service is queried by the beacon service when validating the authenticity of PCBs (i.e., when the beacon service lacks a certificate).</li>
          </ul>
          <t><em>Border routers</em> are deployed at the edge of SCION ASes. The main task of border routers is to forward packets to a neighbor border router or to the destination host within the AS. While SCION takes care of inter-domain routing, it relies on existing routing protocols (e.g., IS-IS, OSPF, SR) and communication fabric (e.g., IP, MPLS) for intra-domain forwarding. <em>Internal routers</em>, therefore, do not need to be changed to support SCION.</t>
        </section>
        <section anchor="formal-verification">
          <name>Formal Verification</name>
          <t>An additional feature of SCION is its formal verification. The SCION network system consists of a variety of components such as routers, servers, and edge devices. Such a complex system eludes the mental capacities of human beings for considering all possible states and interactions. That is why SCION includes a formal verification framework developed by the Department of Computer Science of the ETH Zurich <xref target="KLENZE2021"/>. This guarantees that packet forwarding as well as SCION's authentication mechanisms and implementations are correct and consistent.</t>
        </section>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="key">
      <name>Key Concepts</name>
      <t>This section explains the SCION key concepts, including authentication, control- and data plane.</t>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>SCION's control plane relies on a public-key infrastructure called the <strong>control-plane PKI (CP-PKI)</strong>, which is organized on ISD-level. Each ISD can independently build its own roots of trust, defined in a file called <strong>trust root configuration (TRC)</strong>.</t>
        <t><strong>Note</strong>: This section describes the SCION authentication concept on a very high level. A much more detailed description of SCION's authentication is available in <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="the-control-plane-pki-cp-pki">
          <name>The Control-Plane PKI (CP-PKI)</name>
          <t>Trust within each isolation domain is anchored in the trust root configuration (TRC) file. Each TRC contains a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD-policies that specify, for example, the TRC's usage, validity, and future updates. A TRC is a fundamental component of an CP-PKI.</t>
          <t>The initial TRC in an ISD is called the <strong>base TRC</strong>. This base TRC constitutes the ISD's trust anchor. It is signed during a signing ceremony and then distributed throughout the ISD. All entities within the ISD obtain the initial TRC with an offline mechanism such as a USB flash drive provided by a trusted AS, like the relevant ISP, or with an online mechanism that relies on a trust-on-first-use (TOFU) approach. However, all updates to the base TRCs are performed in a straightforward process that does not require any manual or out-of-band action (such as a software update), see <xref target="update">TRC Update and Verification</xref>.</t>
          <t><xref target="chain"/> shows the TRC trust chain and associated certificates. TRC 1 is the base TRC, and TRC 2 and 3 constitute updates to this base TRC. TRC 2 must be verified using the voting certificates in TRC 1. Control-plane (CP) root certificates are used to verify other CP certificates (which are in turn used to verify path-segment construction beacons PCBs).</t>
          <t>Each SCION AS must hold a private key (to sign PCBs) and a certificate attesting that it is the rightful owner of the corresponding public key. One of the main roles of the TRC is thus enabling the verification of <strong>AS certificates</strong> and PCBs.</t>
          <figure anchor="chain">
            <name>TRC contents and trust chain</name>
            <artwork><![CDATA[
                               TRC 2
               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
          </figure>
        </section>
        <section anchor="update">
          <name>TRC Update and Verification</name>
          <t>With a base TRC as trust anchor, TRCs can be updated in a verifiable manner. There are two kinds of TRC updates: regular and sensitive updates. A <em>regular</em> TRC update happens when the TRC's validity period expires. This period is defined by the <em>validity</em> parameter in the TRC. The default is one year. A TRC update is <em>sensitive</em> if and only if critical sections of the TRC are affected (for example, if the set of core ASes is modified). For both regular and sensitive TRC updates, a number of votes (in the form of signatures) must be cast to approve the update. This number of votes is dictated by the voting quorum and set in each TRC with the <em>voting quorum</em> parameter.</t>
        </section>
        <section anchor="dissemination-of-trc-updates">
          <name>Dissemination of TRC Updates</name>
          <t>Information about a TRC update is disseminated via the SCION’s beaconing process, through the path-segment constructions beacons. Each PCB contains the version number of the currently active TRC. If an AS receives a PCB with a TRC version number higher than the locally stored TRC, it requests the PCB-sending AS for the new TRC. The new TRC is verified on the basis of the current one, and is accepted if it contains at least the required quorum of correct signatures by trust roots defined in the current TRC.
This simple dissemination mechanism has two advantages: It is very efficient (as fresh PCBs rapidly reach all ASes), and it avoids circular dependencies with regard to the verification of PCBs and the beaconing process itself (as no server needs to be contacted over unknown paths in order to fetch the updated TRC).</t>
        </section>
        <section anchor="grace-period">
          <name>Grace Period</name>
          <t>At most two TRCs per ISD can be active at the same time. The TRC parameter <em>grace period</em> indicates for how long the currently active TRC can still be active after a new TRC is disseminated. This so-called <strong>grace period</strong> starts at the beginning of the validity period of the new TRC. An older TRC can only be active until either (1) the grace period has passed, or (2) yet a newer TRC is announced. AS certificates are validated by following the chain of trust up to an active TRC.</t>
        </section>
        <section anchor="revocation-and-recovery-from-a-catastrophic-event">
          <name>Revocation and Recovery from a Catastrophic Event</name>
          <t>The TRC dissemination mechanism also enables rapid revocation of trust roots. When a trust root is compromised, the other trust roots can remove it from the TRC and disseminate a new TRC alongside a PCB with a new version number.</t>
          <t>In case of a catastrophic event—such as several private root keys being disclosed due to a critical vulnerability in a cryptographic library—SCION is equipped with a recovery procedure called <strong>trust reset</strong>. This procedure consists of creating a new TRC with fresh, trustworthy keys (and potentially new algorithms), and redistributing this TRC out-of-band. A trust reset effectively establishes a new base TRC for the ISD. It is possible for ISDs to disable trust resets by setting the <em>no trust reset</em> Boolean parameter to "true" in their TRC, with the effect that the entire ISD would have to be abandoned in the event of such a catastrophic compromise (this abandonment would also have to be announced out-of-band).</t>
          <t>The partition of the SCION network into ISDs guarantees that no single entity can take down the entire network. Even if several entities formed a coalition to carry out an attack, the effects of that attack would be limited to one or a few ISDs.</t>
        </section>
      </section>
      <section anchor="scion-control-plane">
        <name>SCION Control Plane</name>
        <t>The SCION control plane is responsible for discovering path segments and making them available to endpoints. This process includes path exploration, registration, and lookup; it involves the path service, beacon service, and certificate service, both in core ASes and non-core ASes.</t>
        <t><strong>Note</strong>: This section describes the SCION control plane on a very high level. A much more detailed description of SCION's control plane will follow in a separate internet draft.</t>
        <section anchor="path-exploration">
          <name>Path Exploration</name>
          <t>In SCION, the path segment construction process is referred to as <strong>beaconing</strong>. The <em>beacon service</em> of each AS is responsible for the beaconing process. The beacon service generates, receives, and propagates the <strong>path-segment construction beacons (PCBs)</strong> on a regular basis, to iteratively construct path segments.</t>
          <t>There are three types of path segments (note that all path segments can be used to send data traffic in both directions):</t>
          <ul spacing="normal">
            <li>A path segment from a non-core AS to a core AS is an <em>up-path segment</em>.</li>
            <li>A path segment from a core AS to a non-core AS is a <em>down-path segment</em>.</li>
            <li>A path segment between core ASes is a <em>core-path segment</em>.</li>
          </ul>
          <t>All path segments are invertible: A core-path segment can be used bidirectional, and an up-path segment can be converted into a down-path segment, or vice versa, depending on the direction of the end-to-end path.</t>
          <t>Path segment construction is conducted hierarchically on two levels:</t>
          <ul spacing="normal">
            <li>
              <em>Core beaconing</em> is the process of constructing path segments between core ASes. During core beaconing, the beacon service of a core AS either initiates PCBs or propagates PCBs received from neighboring core ASes to all other neighboring core ASes. Core beaconing in SCION is similar to BGP's route-advertising process, although in SCION the process is periodic and PCBs are flooded over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>
              <em>Intra-ISD beaconing</em> creates path segments from core ASes to non-core ASes. For this, the beacon service of a core AS creates PCBs and sends them to the non-core child ASes (typically customer ASes). The beacon service of a non-core child AS receives these PCBs and forwards them to its child ASes, and so on. This procedure continues until the PCB reaches an AS without any customer (leaf AS). As a result, all ASes receive path segments to reach the core ASes of their ISD.</li>
          </ul>
          <t>On its way down, a PCB accumulates cryptographically protected path- and forwarding information per traversed AS. At every AS, metadata as well as information about the AS's ingress and egress interfaces (i.e., link identifiers) is added to the PCB. The ingress and egress interface IDs identify connections to neighboring ASes. These IDs only need to be unique within each AS. Therefore, they can be chosen and encoded by each AS independently and without any need for coordination.</t>
          <t>SCION also supports shortcuts and peering links. In a <em>shortcut</em>, a path only contains an up-path and a down-path segment, which can cross over at a non-core AS that is common to both paths. <em>Peering links</em> can be added to up- or down-path segments, resulting in an operation similar to today’s Internet.</t>
          <t>To reduce beaconing overhead and prevent possible forwarding loops, PCBs do not traverse peering links. Instead, peering links are announced along with a regular path in a PCB. If the path segments of both ASes at the end of a peering link contain this peering link, then it is possible to use the peering link to shortcut the end-to-end path (i.e., without going through the core). SCION also supports peering links that cross ISD boundaries, according to SCION’s path transparency property.</t>
          <t><xref target="pcb"/> shows how intra-ISD PCB propagation works, from the ISD's core AS down to child ASes. For the sake of illustration, the interfaces of each AS are numbered with integer values. In practice, each AS can choose any encoding for its interfaces; in fact, only the AS itself needs to understand its encoding. Here, AS F receives two different PCBs via two different links from core AS X. Moreover, AS F uses two different links to send two different PCBs to AS G, each containing the respective egress interfaces. AS G extends the two PCBs and forwards both of them over a single link to a child AS.</t>
          <figure anchor="pcb">
            <name>Intra-ISD PCB propagation from the ISD core down to child ASes</name>
            <artwork><![CDATA[
                                  .-----.
                                 ; Core  :
                        +-----+  : AS X  ;
                        |PCB  |   \ 2 1 / +-----+
                        |Core |    `+-+'  |pcb  |
                        |Out:2|     | |   |core |
                        +--+--+   +-+ |   |out:1|
                           |      |   |   +--+--+
                           v      |   |      |
                                .-+---+.     v
                   .---.       /  2   3 \             .---.
                  (  J  )- - -; 1      4 :- - - - - -(  H  )
                   `---'      :   AS F   ;            `---'
                            +--\7       /
+----------+ +----------+ <-+     6  5
|PCB       | |pcb       |        `+--+'
|Core      | |core      |         |  |
|Out:2     | |out:1     |         |  |
|----------| |----------|         |  |
|AS F      | |as f      |         |  |
|In:2 Out:7| |in:3 out:7|         |  |
|Peer J:1  | |peer j:1  |         |  | +----------+ +----------+
|Peer H:4  | |peer h:4  |         |  | |PCB       | |pcb       |
|          | |          |         |  | |Core      | |core      |
+--+-------+ +--+-------+         |  | |Out:2     | |out:1     |
   |            |                 |  | |----------| |----------|
  <+           <+                 |  | |AS F      | |as f      |
                                  |  | |In:2 Out:5| |in:3 out:5|
         +----------+ +----------+|  | |Peer J:1  | |peer j:1  |
         |PCB       | |pcb       ||  | |Peer H:4  | |peer h:4  |
         |Core      | |core      ||  | |          | |          |
         |Out:2     | |out:1     ||  | +----+-----+ +----+-----+
         |----------| |----------||  |      |            |
         |AS F      | |as f      ||  |      v            v
         |In:2 Out:6| |in:3 out:6||  |
         |Peer J:1  | |peer j:1  ||  |
         |Peer H:4  | |peer h:4  ||  |
         |          | |          ||  |
         +----+-----+ +----+-----+|  |
              |            |     .+--+-.
              v            v   ,' 5  1  `.
                              ;           :
                              :   AS G    ;
                               \         /
                            +---` 4  3 ,'
                          <-+     `--+'
                                     |  +----------+ +----------+
                                     |  |PCB       | |pcb       |
                                     |  |Core      | |core      |
                                     |  |Out:2     | |out:1     |
           +----------+ +----------+ |  |----------| |----------|
           |PCB       | |pcb       | |  |AS F      | |as f      |
           |Core      | |core      | |  |In:2 Out:5| |in:3 out:5|
           |Out:2     | |out:1     | |  |Peer J:1  | |peer j:1  |
           |----------| |----------| |  |Peer H:4  | |peer h:4  |
           |AS F      | |as f      | |  |----------| |----------|
           |In:2 Out:6| |in:3 out:6| |  |AS G      | |as g      |
           |Peer J:1  | |peer j:1  | |  |In:1 Out:3| |in:1 out:3|
           |Peer H:4  | |peer h:4  | |  |          | |          |
           |----------| |----------| |  +----+-----+ +----+-----+
           |AS G      | |as g      | |       |            |
           |In:5 Out:3| |in:5 out:3| v       v            v
           |          | |          |
           +----+-----+ +----+-----+
                |            |
                v            v
]]></artwork>
          </figure>
          <section anchor="security">
            <name>Security</name>
            <t>Each PCB contains signatures of all on-path ASes. Every time a beacon service receives a PCB, it validates the PCB's authenticity. During this process, the beacon service can query the certificate service, for example, when it lacks an intermediate certificate.</t>
          </section>
          <section anchor="policies">
            <name>Policies</name>
            <t>Each AS can independently set policies dictating which PCBs are sent in which time intervals, and to which neighbors. In particular, PCBs do not need to be propagated immediately upon arrival. However, during bootstrapping and if the AS obtains a PCB containing a previously unknown path, the AS should forward the PCB immediately, to ensure quick connectivity establishment.</t>
          </section>
        </section>
        <section anchor="path-registration">
          <name>Path Registration</name>
          <t>Both the beacon service and the path service are involved in the path registration process. A non-core AS typically receives several PCBs representing several path segments to various core ASes. Out of these PCBs, the non-core AS must select those down-path segments through which it wants to be reached. It is the task of the AS's beacon service to make this selection, according to the criteria described in <xref target="selection">Path-Segment Selection</xref>. The beacon service then registers these path segments both at the local path service and at the path service of all core ASes. When links fail, segments expire, or better segments become available, the beacon service updates the down-path segments registered for its AS.</t>
          <t>As a result, a core AS’s path service contains all intra-ISD path segments registered by the leaf ASes of its ISD. In addition, a core AS path service also stores the preferred core-path segments to other core ASes.</t>
          <section anchor="selection">
            <name>Path-Segment Selection</name>
            <t>Among the received PCBs, the beacon service of an AS must choose (1) a set of PCBs to propagate further, and (2) a set of path segments to register. The selection of these PCBs and path segments is based on a path quality metric. This metric aims at identifying consistent, diverse, efficient, and policy-compliant paths:</t>
            <ul spacing="normal">
              <li>
                <em>Consistency</em> implies that at least one property along the path is uniform, such as an AS capability (e.g., high bandwidth).</li>
              <li>
                <em>Diversity</em> means that the set of paths announced over time are as path-disjoint as possible, in order to provide high-quality multipath options.</li>
              <li>
                <em>Efficiency</em> refers to the length, bandwidth, latency, utilization, and availability of a path, where more efficient paths are naturally preferred.</li>
              <li>
                <em>Policy compliance</em> implies that the path adheres to the AS's routing policy.</li>
            </ul>
            <t>Based on past PCBs, the AS beacon service assigns scores to the current set of candidate path segments, and sends the best segments in the next beaconing interval.</t>
            <t>Core beaconing operates similarly to intra-ISD beaconing, except that core PCBs only traverse core ASes. The same path selection metrics apply, where a core AS attempts to forward the set of most desirable paths to its neighbors.</t>
          </section>
        </section>
        <section anchor="path-lookup">
          <name>Path Lookup</name>
          <t>A host (source) who wants to start communication with another host (destination), requires up to three path segments: An up-path segment to reach the ISD core, a core-path segment to reach the destination ISD, and a down-path segment to reach the destination AS. The source host queries the path service in its AS for such segments. The path service has up-path segments stored in its database and furthermore checks if it has appropriate core- and down-path segments in its cache; in this case it returns them immediately.</t>
          <t>If not, the path service in the source AS queries core path services (using locally stored up-path segments) in the source ISD for core-path segments to the destination ISD. Then, it combines up-path segments with the newly retrieved core-path segments, and queries core path services in the remote ISD to fetch remote down-path segments. To improve overall efficiency, the local path service caches the returned path segments and uses parallelism when requesting path segments from core path services. Finally, the local path service returns all path segments to the source host.</t>
          <t>This recursive lookup significantly simplifies the process for endpoints (which only have to send a single query, similar to stub DNS resolvers). The caching strategy ensures that path lookups are fast for frequently used destinations (similar to caching in recursive DNS resolvers).</t>
        </section>
        <section anchor="link-failures">
          <name>Link Failures</name>
          <t>Unlike in the current Internet, link failures are not automatically resolved by the network, but require active handling by endpoints. Since SCION forwarding paths are static, they break when one of the links fails. Link failures are handled by a two-pronged approach that typically masks link failures without any outage to the application and rapidly re-establishes fresh working paths:</t>
          <ul spacing="normal">
            <li>The SCION Control Message Protocol (SCMP) (the SCION equivalent of ICMP) is used for signaling connectivity problems. Instead of relying on application- or transport-layer timeouts, endpoints get immediate feedback from the network if a path stops working, and can quickly switch to an alternative path.</li>
            <li>SCION endpoints are encouraged to use multipath communication by default, thus masking a link failure with another working path. As multipath communication can increase availability (even in environments with very limited path choices), SCION beacon services attempt to create disjoint paths, SCION path services attempt to select and announce disjoint paths, and endpoints compose path segments to achieve maximum resilience to path failure. Consequently, most link failures in SCION remain unnoticed by the application, unlike the frequent (albeit mostly brief) outages in the current Internet. See also <xref target="ANDERSEN2001"/>, <xref target="KATZ2012"/>, <xref target="KUSHMAN2007"/>, and <xref target="HITZ2021"/>.</li>
          </ul>
        </section>
      </section>
      <section anchor="scion-data-plane">
        <name>SCION Data Plane</name>
        <t>While the control plane is responsible for providing end-to-end paths, the data plane ensures that packets are forwarded on the selected path. SCION border routers forward packets to the next AS based on the AS-level path in the packet header (which is extended with ingress and egress interface identifiers for each AS), without inspecting the destination address and also without consulting an inter-domain forwarding table. Only the border router at the destination AS needs to inspect the destination address to forward it to the appropriate local endpoint.</t>
        <t>Because SCION splits the information about the locator (the path towards the destination AS) and the identifier (the destination address), the identifier can have any format that the destination AS can interpret--only the destination needs to consider that local identifier (see also <xref target="RFC6830"/>). In other words, an AS can select an arbitrary addressing format for its hosts, e.g., a 4-byte IPv4, 6-byte media access control (MAC) address, 16-byte IPv6, or any other up to 16-byte addressing scheme. A valuable consequence is that hosts with different address types can directly communicate.</t>
        <t>The next two sections describe how an endpoint combines path segments into an end-to-end forwarding path, and how border routers forward packets efficiently.</t>
        <t><strong>Note</strong>: This section describes the SCION data plane on a very high level. A much more detailed description of SCION's data plane will follow in a separate internet draft.</t>
        <section anchor="path-construction-via-segment-combination">
          <name>Path Construction via Segment Combination</name>
          <t>Through the path lookup, the endpoint obtains path segments that must be combined into an end-to-end path. A valid SCION <strong>forwarding path</strong> can be created by combining up to three path segments, in the following ways:</t>
          <ul spacing="normal">
            <li>
              <strong>Immediate combination of path segments</strong>: The last AS on the up-path segment is also the first AS on the down-path segment. In this case, the simple combination of an up-path segment and a down-path segment creates a valid forwarding path.</li>
            <li>
              <strong>AS shortcut</strong>: The up-path segment and down-path segment intersect at a non-core AS. In this case, a shorter forwarding path can be created by removing the extraneous part of the path.</li>
            <li>
              <strong>Peering shortcut</strong>: A peering link exists between the two segments, so a shortcut via the peering link is possible. As in the AS shortcut case, the extraneous path segment is cut off. The peering link could be traversing to a different ISD.</li>
            <li>
              <strong>Combination with a core-path segment</strong>: The last AS on the up-path segment is different from the first AS on the down-path segment. This case requires an additional core-path segment to connect the up- and down-path segment. If the communication remains within the same ISD, a local ISD core-path segment is needed; otherwise, an inter-ISD core-path segment is required.</li>
            <li>
              <strong>On-path</strong>: The destination AS is part of the up-path segment or the source AS is part of the down-path segment; in this case, a single up- or down-path segment, respectively, is sufficient to create a forwarding path.</li>
          </ul>
          <t>Once a forwarding path is chosen, it is encoded in the SCION packet header. This makes inter-domain routing tables unnecessary for border routers: Both the ingress and the egress interface of each AS on the path are encoded as <strong>packet-carried forwarding state (PCFS)</strong> in the packet header. The destination can respond to the source by reversing the end-to-end path from the packet header, or it can perform its own path lookup and combination.</t>
          <t>The SCION packet header contains of a sequence of <strong>hop fields (HFs)</strong>, one HF for each AS that is traversed on the end-to-end path. Each hop field contains the encoded numbers of the ingress and egress links, and thus defines which interfaces may be used to enter and leave an AS. In addition to the hop fields, each path segment contains an <strong>info field (INF)</strong> with basic information about the segment. A host can create an end-to-end forwarding path by extracting info fields and hop fields from path segments, as depicted in <xref target="HFs"/>. The additional meta header (META) contains pointers to the currently active INF and HF.</t>
          <figure anchor="HFs">
            <name>Combining three path segments into a forwarding path</name>
            <artwork><![CDATA[
up-path segment        core-path segment        down-path segment

+-------+              +-------+                +-------+
|+-----+|              |+-----+|                |+-----+|
|+ INF ||----------+   |+ INF ||---+            |+ INF ||-+
|+-----+|          |   |+-----+|   |            |+-----+| |
|+-----+|          |   |+-----+|   |            |+-----+| |
|| hf  ||--------+ |   || hf  ||---+--+         || hf  ||-+--+
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|| hf  ||-----+  | |   || hf  ||---+--+--+      || hf  ||-+--+--+
|+-----+|     |  | |   |+-----+|   |  |  |      |+-----+| |  |  |
|+-----+|     |  | |   +-------+   |  |  |      +-------+ |  |  |
|| hf  ||--+  |  | |               |  |  |                |  |  |
|+-----+|  |  |  | |   +--------+  |  |  |                |  |  |
+-------+  |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |++ Meta||  |  |  |                |  |  |
           |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |+-----+ |  |  |  |                |  |  |
           |  |  | +-->|+ INF | |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+ INF | |<-+  |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+ INF | |<----+--+----------------+  |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  +---->|| hf  | |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  +------->|| hf  | |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           +---------->|| hf  | |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       || hf  | |<----+  |                   |  |
                       |+-----+ |        |                   |  |
                       |+-----+ |        |                   |  |
                       || hf  | |<-------+                   |  |
                       |+-----+ |                            |  |
                       |+-----+ |                            |  |
                       || hf  | |<---------------------------+  |
                       |+-----+ |                               |
                       |+-----+ |                               |
                       || hf  | |<------------------------------+
                       |+-----+ |
                       +--------+
                     forwarding path
]]></artwork>
          </figure>
        </section>
        <section anchor="path-authorization">
          <name>Path Authorization</name>
          <t>It is crucial for the data plane that endpoints only use paths constructed and authorized by ASes in the control plane. In particular, endpoints should not be able to craft HFs themselves, modify HFs in authorized path segments, or combine HFs of different path segments (path splicing). This property is called <strong>path authorization</strong> (see <xref target="KLENZE2021"/> and <xref target="LEGNER2020"/>).</t>
          <t>SCION achieves path authorization by creating message-authentication codes (MACs) during the beaconing process. Each AS calculates these MACs using a local secret key (that is only shared between SCION infrastructure elements within the AS) and chains them to the previous HFs. The MACs are then included in the forwarding path as part of the respective HFs.</t>
        </section>
        <section anchor="forwarding">
          <name>Forwarding</name>
          <t>Routers can efficiently forward packets in the SCION architecture. In particular, the absence of inter-domain routing tables and of complex longest-IP-prefix matching performed by current routers enables the construction of more efficient routers.</t>
          <t>During packet forwarding, a SCION border router at the ingress point of the AS verifies that:</t>
          <ul spacing="normal">
            <li>the packet entered through the correct ingress interface corresponding to the information in the HF,</li>
            <li>the HF is still valid, and</li>
            <li>the MAC in the HF is correct.</li>
          </ul>
          <t>If the packet has not yet reached the destination AS, the egress interface number in the HF of the non-destination AS refers to the egress SCION border router of this AS. In this case, the packet can be sent from the ingress SCION border router to the egress SCION border router via native intra-domain forwarding (e.g., IP or MPLS). In case the packet has arrived at the destination AS, the destination AS's border router inspects the destination address and sends the packet to the corresponding host.</t>
        </section>
        <section anchor="intra-as-communication">
          <name>Intra-AS Communication</name>
          <t>SCION routers use IP to communicate within an AS, therefore they rely on existing intra-domain routing protocols, such as Multiprotocol Label Switching (MPLS) or others.</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment</name>
      <t>Adoption of a next-generation architecture is a challenging task, as it needs to be integrated with, and operate alongside existing infrastructure. SCION is designed to coexist with existing intra-domain routing infrastructure, and comprises coexistence and transition mechanisms that facilitate adoption, in accordance to principles defined in <xref target="RFC8170"/>.
The following section discusses practical considerations for deploying SCION and briefly touches on some of the transition mechanisms, with focus on:</t>
      <ul spacing="normal">
        <li>
          <xref target="deployment-as">Autonomous Systems</xref>,</li>
        <li>
          <xref target="deployment-ixp">Internet Exchange Points</xref>, and</li>
        <li>
          <xref target="deployment-end-host">endpoints</xref>, covering both native SCION hosts and SCION to IP encapsulation.</li>
      </ul>
      <t>We then describe some of the early adopters deployment experiences. A more detailed adoption plan is to be outlined in dedicated documents.</t>
      <section anchor="deployment-as">
        <name>Autonomous System Deployment</name>
        <t>A SCION AS needs to deploy the SCION <xref target="infra-components">infrastructure components</xref> and border routers.
Within an AS, SCION is often deployed as an IP overlay on top of the existing network. This way SCION allows to reuse the existing intra-domain network and equipment (e.g., IP, MPLS). Customer-side SCION border routers directly connect to the provider-side border routers using last-mile connections. The SCION design assumes that AS’s internal entities are considered to be trustworthy, therefore the IP overlay or the first-hop routing does not compromise or degrade any security properties SCION delivers.
When it comes to inter-domain communication, an overlay deployment on top of today’s Internet is not desirable, as SCION would inherit issues from  its weak underlay. Thus, inter-AS SCION links are usually deployed in parallel to existing links, in order to preserve its security properties. That is, two SCION border routers from neighbour ASes are directly connected via a layer-2 cross-connection at a common point-of-presence.</t>
        <t>All SCION AS components can be deployed on standard x86 commercial off-the-shelf servers or virtual machines. In fact, SCION border routers do not rely on forwarding tables, therefore they do not require specialized hardware. Practice shows that off-the-shelf hardware can handle up to 100 Gbps links, while a prototype <xref target="DERUITER2021">P4 implementation</xref> showed that it is possible to forward SCION traffic even at terabit speeds.</t>
        <t>Overall, an AS can be connected to SCION without high-impact changes to its network. In addition, use of commodity hardware for both control and data-plane components reduces initial deployment costs.</t>
      </section>
      <section anchor="deployment-ixp">
        <name>Internet Exchange Points</name>
        <t>Internet Exchange Points (IXP) play as important a role for SCION as they do in today's Internet.  SCION can be deployed at existing IXPs following a "big switch" model, where the IXP provides a large L2 switch between multiple SCION ASes. SCION has been deployed following this model at the Swiss Internet Exchange (SwissIX),  currently interconnecting major SCION Swiss ISPs and enterprises through bi-lateral peering over dedicated SCION ports.</t>
        <t>Additionally, thanks to its path-awareness, SCION offers the option of an enhanced deployment model, i.e., to expose the internal topology of an IXP within the SCION control plane. This enables IXP customers to use SCION’s multipath and fast failover capabilities to leverage the IXP’s internal links (including backup links) and to select paths depending on the application’s needs.  IXPs have therefore an incentive to expose their rich internal connectivity, as the benefits from SCION’s multipath capabilities would increase their value for customers and provide them with a competitive advantage.</t>
      </section>
      <section anchor="deployment-end-host">
        <name>Endpoints and Incremental Deployability</name>
        <t>End users can leverage SCION in two different ways: (1) using SCION-aware applications on a <xref target="native-endhost">SCION native endpoint</xref>, or (2) using transparent <xref target="sig">IP-to-SCION conversion</xref>. The benefit of using SCION natively is that the full range of advantages becomes available to applications, at the cost of installing the SCION endpoint stack and making the application SCION-aware. In early deployments, the second approach is often preferred, so that no changes are needed within applications or endpoints.</t>
        <section anchor="native-endhost">
          <name>Native Endpoints</name>
          <t>A SCION native endpoint's stack consists of a dispatcher, which handles all incoming and outgoing SCION packets, and of a SCION daemon, which handles control-plane messages. The latter  fetches paths to remote ASes and provides an API for applications and libraries to interact with the SCION control plane (i.e., for path lookup, SCION extensions). The current SCION implementation uses an UDP/IP underlay for communication between endpoints and SCION routers. This allows reuse of existing intra-domain networking infrastructure. SCION endpoints can optionally use automated bootstrapping mechanisms to retrieve configuration from the network and establish SCION connectivity. This way, clients require no pre-existing network-specific configurations.</t>
        </section>
        <section anchor="sig">
          <name>SCION to IP Gateway (SIG)</name>
          <t>A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
A SIG can be deployed close to the end user (i.e., at branches of an enterprise, on a CPE), or within an ISP's network. In the latter case, the SIG is called carrier-grade SIG, as it serves multiple customers within the AS where it is deployed. This approach has the advantage that it does not require any changes at the customer's premises.
In order to allow incremental deployability and to ease transition from legacy IP-based Internet to SCION, SIGs can be augmented with  mechanisms allowing them to coordinate and automatically exchange IP prefix information. A more detailed description of the SIG and its coordination mechanisms is to be presented in dedicated documents.</t>
        </section>
      </section>
      <section anchor="deploy">
        <name>Deployment Experiences</name>
        <t>SCION has been deployed in production by multiple entities, growing its acceptance among industry. While early deployments started on academic and research networks, SCION has expanded to serve the financial industry, government, and it is being evaluated for the healthcare sector.</t>
        <t>In 2017, SCION was evaluated for production use by a central bank, with the goal of modernising the network interconnecting banks and their branches. SCION was chosen, as it allows moving away from a dedicated private network to a reliable Internet-based solution. SCION connectivity was later extended to support system-critical applications, like the national real-time gross settlement (RTGS) system, connecting all country's banks to exchange real-time payment information.
The network, called Secure Swiss Finance Network or <eref target="https://perma.cc/PU5L-ALPM">SSFN</eref>, is implemented as a SCION ISD, where a federation of three ISPs forms the ISD core.
Financial institutions are themselves SCION ASes and directly connect to one or more of the core ASes. Institutions deploy SCION–IP gateways (SIGs), transparently enabling their traditional IP-based applications to use the SCION network.
The concept of the SCION ISD also provides a mechanism to implement strict governance and access control (through the issuance of AS certificates).</t>
        <t>Besides the SSFN, SCION connectivity has also been adopted by government entities for their international communications. In addition, Swiss higher education institutions are connected thanks to the <eref target="http://scied.scion-architecture.net/">SCI-ED</eref> network.</t>
        <t>In addition to productive deployments, SCION also comprises a global SCION research testbed called <eref target="https://www.scionlab.org">SCIONLab</eref>. It is composed of dozens of globally distributed infrastructure ASes, mostly run by academic institutions. The testbed is open to any user who can easily set up their own AS with the aid of a web-based UI, connect to the network, and run experiments. The setup has been the earliest global deployment of SCION and it has been supporting research and development of path-aware networking and SCION.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently, this document has no request for action to IANA.
However, when full specification of SCION is available, requests for IANA actions are expected regarding the registration of optional packet header fields as well as the coordination of SCION ISD and AS number assignments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCION has been designed from the outset to offer security by default, and thus there are manifold security considerations. As a matter of fact, SCION's protocol design has been formally verified and the open source router implementation is undergoing formal verification (see also <xref target="KLENZE2021"/>). Describing all security considerations here, therefore, would go beyond the scope of this document. A separate document including all security implications and considerations will follow later.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4264">
          <front>
            <title>BGP Wedgies</title>
            <author fullname="T. Griffin" initials="T." surname="Griffin">
              <organization/>
            </author>
            <author fullname="G. Huston" initials="G." surname="Huston">
              <organization/>
            </author>
            <date month="November" year="2005"/>
            <abstract>
              <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner.  In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable.  Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies".  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4264"/>
          <seriesInfo name="DOI" value="10.17487/RFC4264"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <author fullname="M. Larson" initials="M." surname="Larson">
              <organization/>
            </author>
            <author fullname="D. Massey" initials="D." surname="Massey">
              <organization/>
            </author>
            <author fullname="S. Rose" initials="S." surname="Rose">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski">
              <organization/>
            </author>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing.  The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security.  As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space.  Such verifiable authorizations could be used, for example, to more securely construct BGP route filters.   This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6830">
          <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci">
              <organization/>
            </author>
            <author fullname="V. Fuller" initials="V." surname="Fuller">
              <organization/>
            </author>
            <author fullname="D. Meyer" initials="D." surname="Meyer">
              <organization/>
            </author>
            <author fullname="D. Lewis" initials="D." surname="Lewis">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs).  No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure.  The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
              <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6830"/>
          <seriesInfo name="DOI" value="10.17487/RFC6830"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski">
              <organization/>
            </author>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram">
              <organization/>
            </author>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes.  BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message.  The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9049">
          <front>
            <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
            <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
              <t>This document contains that catalog and analysis.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9049"/>
          <seriesInfo name="DOI" value="10.17487/RFC9049"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell">
              <organization/>
            </author>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol.  Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult.  This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="SCHUCHARD2011">
          <front>
            <title>Losing control of the internet: using the data plane to attack the control plane</title>
            <author fullname="Max Schuchard" initials="M." surname="Schuchard">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Yongdae Kim" initials="Y." surname="Kim">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
              <organization>Kansas State University, Manhaattan, KS, USA</organization>
            </author>
            <date month="October" year="2010"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications" value="security"/>
          <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
        </reference>
        <reference anchor="LABOVITZ2000">
          <front>
            <title>Delayed Internet routing convergence</title>
            <author fullname="Craig Labovitz" initials="C." surname="Labovitz">
              <organization>Microsoft Research, One Microsoft Way, Redmond, WA</organization>
            </author>
            <author fullname="Abha Ahuja" initials="A." surname="Ahuja">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Abhijit Bose" initials="A." surname="Bose">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Farnam Jahanian" initials="F." surname="Jahanian">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <date month="August" year="2000"/>
          </front>
          <seriesInfo name="Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer" value="Communication"/>
          <seriesInfo name="DOI" value="10.1145/347059.347428"/>
        </reference>
        <reference anchor="GRIFFIN1999">
          <front>
            <title>An analysis of BGP convergence properties</title>
            <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <date month="August" year="1999"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 29, no. 4, pp. 277-288"/>
          <seriesInfo name="DOI" value="10.1145/316194.316231"/>
        </reference>
        <reference anchor="SAHOO2009">
          <front>
            <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
            <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
              <organization/>
            </author>
            <author fullname="Krishna Kant" initials="K." surname="Kant">
              <organization/>
            </author>
            <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
          </front>
          <seriesInfo name="Computer Communications" value="vol. 32, no. 7-10, pp. 1207-1218"/>
          <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
        </reference>
        <reference anchor="LYCHEV2013">
          <front>
            <title>BGP security in partial deployment: is the juice worth the squeeze?</title>
            <author fullname="Robert Lychev" initials="R." surname="Lychev">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA, USA</organization>
            </author>
            <author fullname="Michael Schapira" initials="M." surname="Schapira">
              <organization>Hebrew University of Jerusalem, Jerusalem, Israel</organization>
            </author>
            <date month="August" year="2013"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 43, no. 4, pp. 171-182"/>
          <seriesInfo name="DOI" value="10.1145/2534169.2486010"/>
        </reference>
        <reference anchor="LI2014">
          <front>
            <title>Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?</title>
            <author fullname="Qi Li" initials="Q." surname="Li">
              <organization/>
            </author>
            <author fullname="Yi-Chun Hu" initials="Y." surname="Hu">
              <organization/>
            </author>
            <author fullname="Xinwen Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <seriesInfo name="Proceedings 2014 Workshop on Security of Emerging Networking" value="Technologies"/>
          <seriesInfo name="DOI" value="10.14722/sent.2014.23001"/>
        </reference>
        <reference anchor="COOPER2013">
          <front>
            <title>On the risk of misbehaving RPKI authorities</title>
            <author fullname="Danny Cooper" initials="D." surname="Cooper">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Ethan Heilman" initials="E." surname="Heilman">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Kyle Brogle" initials="K." surname="Brogle">
              <organization>Stanford University, Stanford, CA</organization>
            </author>
            <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
        </reference>
        <reference anchor="ROTHENBERGER2017">
          <front>
            <title>Internet Kill Switches Demystified</title>
            <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <date month="April" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
        </reference>
        <reference anchor="MORILLO2021">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking</title>
            <author fullname="Reynaldo Morillo" initials="R." surname="Morillo">
              <organization/>
            </author>
            <author fullname="Justin Furuness" initials="J." surname="Furuness">
              <organization/>
            </author>
            <author fullname="Cameron Morris" initials="C." surname="Morris">
              <organization/>
            </author>
            <author fullname="James Breslin" initials="J." surname="Breslin">
              <organization/>
            </author>
            <author fullname="Amir Herzberg" initials="A." surname="Herzberg">
              <organization/>
            </author>
            <author fullname="Bing Wang" initials="B." surname="Wang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="Proceedings 2021 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
        </reference>
        <reference anchor="KLENZE2021">
          <front>
            <title>Formal Verification of Secure Forwarding Protocols</title>
            <author fullname="Tobias Klenze" initials="T." surname="Klenze">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Christoph Sprenger" initials="C." surname="Sprenger">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="David Basin" initials="D." surname="Basin">
              <organization>ETH Zurich</organization>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 IEEE 34th Computer Security Foundations Symposium" value="(CSF)"/>
          <seriesInfo name="DOI" value="10.1109/csf51468.2021.00018"/>
        </reference>
        <reference anchor="DERUITER2021">
          <front>
            <title>Next-generation internet at terabit speed: SCION in P4</title>
            <author fullname="Joeri de Ruiter" initials="J." surname="de Ruiter">
              <organization>SURF, Utrecht, The Netherlands</organization>
            </author>
            <author fullname="Caspar Schutijser" initials="C." surname="Schutijser">
              <organization>SIDN Labs, Arnhem, The Netherlands</organization>
            </author>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="Proceedings of the 17th International Conference on emerging Networking EXperiments and" value="Technologies"/>
          <seriesInfo name="DOI" value="10.1145/3485983.3494839"/>
        </reference>
        <reference anchor="ANDERSEN2001">
          <front>
            <title>Resilient overlay networks</title>
            <author fullname="David Andersen" initials="D." surname="Andersen">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Hari Balakrishnan" initials="H." surname="Balakrishnan">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Frans Kaashoek" initials="F." surname="Kaashoek">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Robert Morris" initials="R." surname="Morris">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="October" year="2001"/>
          </front>
          <seriesInfo name="Proceedings of the eighteenth ACM symposium on Operating systems" value="principles"/>
          <seriesInfo name="DOI" value="10.1145/502034.502048"/>
        </reference>
        <reference anchor="KATZ2012">
          <front>
            <title>LIFEGUARD: practical repair of persistent route failures</title>
            <author fullname="Ethan Katz-Bassett" initials="E." surname="Katz-Bassett">
              <organization>University of Washington &amp;amp; University of Southern California, Seattle, WA, USA</organization>
            </author>
            <author fullname="Colin Scott" initials="C." surname="Scott">
              <organization>University of California, Berkeley, Berkeley, CA, USA</organization>
            </author>
            <author fullname="David R. Choffnes" initials="D." surname="Choffnes">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Ítalo Cunha" initials="Í." surname="Cunha">
              <organization>Universidade Federal de Minas Gerais, Belo Horizonte, MG, Brazil</organization>
            </author>
            <author fullname="Vytautas Valancius" initials="V." surname="Valancius">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Nick Feamster" initials="N." surname="Feamster">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Harsha V. Madhyastha" initials="H." surname="Madhyastha">
              <organization>University of California, Riverside, Riverside, CA, USA</organization>
            </author>
            <author fullname="Thomas Anderson" initials="T." surname="Anderson">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Arvind Krishnamurthy" initials="A." surname="Krishnamurthy">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <date month="August" year="2012"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 42, no. 4, pp. 395-406"/>
          <seriesInfo name="DOI" value="10.1145/2377677.2377756"/>
        </reference>
        <reference anchor="KUSHMAN2007">
          <front>
            <title>Can you hear me now?!: it must be BGP</title>
            <author fullname="Nate Kushman" initials="N." surname="Kushman">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Srikanth Kandula" initials="S." surname="Kandula">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Dina Katabi" initials="D." surname="Katabi">
              <organization>MIT CSAIL</organization>
            </author>
            <date month="March" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 37, no. 2, pp. 75-84"/>
          <seriesInfo name="DOI" value="10.1145/1232919.1232927"/>
        </reference>
        <reference anchor="PERRIG2017" target="https://doi.org/10.1007/978-3-319-67080-5">
          <front>
            <title>SCION: A Secure Internet Architecture</title>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="P." surname="Szalachowski" fullname="Pawel Szalachowski">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="R." surname="Reischuk" fullname="Raphael Reischuk">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-319-67079-9"/>
        </reference>
        <reference anchor="KING2022" target="https://datatracker.ietf.org/doc/draft-king-irtf-challenges-in-routing/">
          <front>
            <title>Challenges for the Internet Routing Systems Introduced by Semantic Routing</title>
            <author initials="D." surname="King" fullname="Daniel King">
              <organization>Lancaster University</organization>
            </author>
            <author initials="A." surname="Farrel" fullname="Adrian Farrel">
              <organization>Old Dog consulting</organization>
            </author>
            <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
              <organization>Orange</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="HITZ2021" target="https://perma.cc/4H3Q-WZNG">
          <front>
            <title>Demonstrating the reliability and resilience of Secure Swiss Finance Network</title>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://www.usenix.org/conference/usenixsecurity20/presentation/legner">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
        <reference anchor="I-D.rustignoli-scion-components" target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/">
          <front>
            <title>SCION Components Analysis</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
          <front>
            <title>SCION Control-Plane PKI</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Cyrill Krähenbühl and Juan A. Garcia-Pardo for reviewing this document. We are also indebted to Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter Müller, for writing the book "The Complete Guide to SCION" (see <xref target="CHUAT22"/>), which provides the background information needed to write this informational draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
