<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-panrg-scion-overview-04" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="SCION I-D">SCION Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-04"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>cdk@scion.org</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="A." surname="Perrig" fullname="Adrian Perrig">
      <organization>ETH Zuerich</organization>
      <address>
        <email>adrian.perrig@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2023" month="September" day="07"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 201?>

<t>The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next-generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts.</t>
      <t>This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane.
A more detailed analysis of relationships and dependencies between components is available in <xref target="I-D.rustignoli-scion-components"/>.
As SCION is already in production use today, the document concludes with an overview of SCION deployments.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-overview_I-D/draft-dekater-panrg-scion-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-overview_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <?line 209?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Introduction section explores the motivation to develop SCION, followed by a short description of SCION's main elements. The sections after the Introduction provide further insight into SCION's key concepts and deployment scenarios. The document concludes with some concrete case studies where SCION has been successfully deployed in production.</t>
      <section anchor="why">
        <name>Why SCION - Motivation</name>
        <t>Since its inception, the Internet has continued to expand, encompassing new uses over time. The continuous expansion has brought many issues to light, including a lack of control, limitations in scalability, performance and security, occurrences of severe outages, weak fault isolation, and energy consumption. With the core focus on functionality and operation, the current Internet offers little protection against attacks such as spoofing, IP-address hijacking, denial-of-service, and combinations of these. For more background information, see <xref target="SCHUCHARD2011"/>, <xref target="LABOVITZ2000"/>, <xref target="GRIFFIN1999"/>, <xref target="SAHOO2009"/>, and <xref target="RFC4264"/>.</t>
        <t>There have been numerous initiatives to address the above issues. Although these initiatives have brought many improvements, concerns regarding security and scalability still remain. For more details, see, e.g., <xref target="RFC4033"/>, <xref target="RFC6480"/>, <xref target="RFC8205"/>, and <xref target="RFC8446"/>, as well as <xref target="LYCHEV2013"/>, <xref target="LI2014"/>, <xref target="COOPER2013"/>, <xref target="ROTHENBERGER2017"/>, <xref target="MORILLO2021"/>, and <xref target="KING2022"/>.</t>
        <t>As a consequence, today's Internet fails to fulfil many users' requirements. This especially pertains to the demands of enterprises globally exchanging sensitive information, such as financial institutions, healthcare providers, universities, multinationals, governments, critical and transportation infrastructure operators. These users require the Internet to be highly available at all times. They expect reliable operation of the global network also in case of failures. They need availability guarantees across multiple routing domains, even in the presence of attacks. They further want to rely on an Internet that can be multilaterally governed and is free from global kill-switches.</t>
        <t>SCION has been developed in order to meet the above-mentioned requirements. SCION aims to reach the following goals:</t>
        <ul spacing="normal">
          <li>Provide high-availability architecture (also in the presence of adversaries)</li>
          <li>Provide fast failover in the case of inter-domain link or router failures</li>
          <li>Prevent from IP-address hijacking, DoS, and other attacks</li>
          <li>Enable path transparency as well as application-specific path optimizations</li>
          <li>Improve the inter-domain control plane's scalability</li>
          <li>Prepare the Internet for tomorrow's applications, such as virtual reality, Internet of Things (IoT), and all other applications requiring high-performance connectivity.</li>
        </ul>
        <section anchor="scope-of-scion">
          <name>Scope of SCION</name>
          <t>The above section describes SCION's aspiration to improve <em>inter</em>-AS routing and to focus on providing end-to-end connectivity. However, SCION does not solve <em>intra</em>-AS routing issues, nor does it provide end-to-end payload encryption, and identity authentication. These topics, which are equally important for the Internet to perform well, lie outside the scope of SCION.</t>
        </section>
        <section anchor="practical-considerations-based-on-related-rfcs">
          <name>Practical Considerations Based on Related RFCs</name>
          <t>The SCION inter-domain routing concept has initially been developed by researchers of the ETH Zuerich <xref target="PERRIG2017"/>, and could in the meantime also gain attention and recognition in the international academic world. However, for an IT architecture to be successful, it must work well in practice, too. This section pays attention to the implementation considerations of a conceptual framework such as SCION in real life, on the basis of some RFCs exploring this topic. It also verifies in how far SCION meets the requirements mentioned and questions raised in these RFCs.</t>
          <section anchor="avoiding-pitfalls">
            <name>Avoiding Pitfalls</name>
            <t><xref target="RFC9049"/> describes why previous proposals to tackle some of the Internet's fundamental issues did not manage to succeed. SCION seems to avoid the pitfalls mentioned in that document. For example, SCION does not have to be adopted by the entire Internet to be effective: The routing architecture provides benefits already to early adapters. Even if only a small part of the global network works with SCION, adapters will still take advantage of using the SCION routing technology. Moreover, not only users of SCION benefit from it, also ISPs and operators benefit from deploying SCION: early deployments showed that providers can charge the use of SCION as premium connectivity, with users who are willing to pay for it. Furthermore, SCION can be installed on top of and function alongside the existing routing infrastructure and protocols--there is no need for high-impact changes in an operational network.</t>
            <t>Another RFC that must be mentioned in this context is <xref target="RFC5218"/>, "What Makes for a Successful Protocol?". SCION seems to fulfil most factors that contribute to the success of a protocol, as described in section 2.1 of the RFC. This includes such factors as offering a positive net value (i.e., the benefits of deploying SCION outweigh the costs), incremental deployability, and open source code availability. More importantly, SCION averts the failure criteria mentioned in section 1.4 of the RFC: SCION is already deployed and in use by many actors of the Swiss financial and academic ecosystems, and allows for multiple implementations, both open and closed source. As existing SCION implementations are easily portable, adoption in mainstream platforms is also possible.</t>
          </section>
          <section anchor="answering-questions">
            <name>Answering Questions</name>
            <t>SCION can be considered a <em>path-aware internetworking</em> architecture, as described in <xref target="RFC9217"/>. This RFC poses (open) questions that must be answered in order to realize such a path-aware networking system. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            <t>SCION intends to answer the questions raised in this RFC. This especially pertains to the second, third, seventh, and eighth question:</t>
            <ul spacing="normal">
              <li>How do endpoints and applications get access to accurate, useful, and trustworthy path properties?</li>
              <li>How can endpoints select paths to use for traffic in a way that can be trusted by the network, the endpoints, and the applications using them?</li>
              <li>How can a path-aware network in a path-aware internetwork be effectively operated, given control inputs from network administrators, application designers, and end users?</li>
              <li>How can the incentives of network operators and end users be aligned to realize the vision of path-aware networking, and how can the transition from current ("path-oblivious") to path-aware networking be managed?</li>
            </ul>
            <t>SCION's answers to these questions can be found in <xref target="key">Key Concepts</xref> and <xref target="deploy">Deployments</xref>, respectively.</t>
          </section>
        </section>
        <section anchor="why-now">
          <name>Why Now?</name>
          <t>The emergence of multiple SCION implementations and early deployments highlights the need for standardization. The time seems therefore ripe to take SCION to the IETF, also in order to contribute to the important discussion regarding path-aware networking.</t>
        </section>
      </section>
      <section anchor="scion-overview">
        <name>SCION Overview</name>
        <t>SCION has been designed to address the fundamental issues of today's Internet depicted in <xref target="why">Why SCION - Motivation</xref>. The following section gives a high-level overview of SCION's main elements, providing a basic understanding of this next-generation inter-network architecture.</t>
        <section anchor="network-architecture-and-naming">
          <name>Network Architecture and Naming</name>
          <t>SCION's main goal is to offer highly available and efficient inter-domain packet delivery—even in the presence of actively malicious entities. To achieve scalability and sovereignty, SCION organizes existing ASes into groups of independent routing planes, called <strong>Isolation Domains (ISD)</strong>. An AS can be a member of multiple ISDs. All ASes in an ISD agree on a set of trust roots, called the <strong>Trust Root Configuration (TRC)</strong>. The ISD is governed by a set of <strong>core ASes</strong>, which provide connectivity to other ISDs and manage the trust roots. Typically, a few distinguished ASes within an ISD form the ISD’s core.</t>
          <t>Isolation domains serve the following purposes:</t>
          <ul spacing="normal">
            <li>They allow SCION to support trust heterogeneity, as each ISD can independently define its roots of trust;</li>
            <li>They provide transparency for trust relationships;</li>
            <li>They isolate the routing process within an ISD from external influences such as attacks and misconfigurations; and</li>
            <li>They improve the scalability of the routing protocol by separating it into a process within and one between ISDs.</li>
          </ul>
          <t>ISDs provide natural isolation of routing failures and misconfigurations, provide meaningful and enforceable trust, enable endpoints to optionally restrict traffic forwarding to trusted parts of the Internet infrastructure only, and enable scalable routing updates with high path-freshness.</t>
          <section anchor="links">
            <name>Links</name>
            <t>There are three types of links in SCION: core links, parent-child links, and peering links.</t>
            <ul spacing="normal">
              <li>A <strong>core link</strong> can only exist between two core ASes.</li>
              <li>A <strong>parent-child link</strong> requires that at least one of the two connected ASes is a non-core AS. ASes with a parent-child link usually belong to the same entity or have a provider-customer relationship.</li>
              <li>A <strong>peering link</strong> also includes at least one non-core AS.</li>
            </ul>
            <t>See <xref target="architecture"/> for a high-level overview of the SCION network structure.</t>
            <figure anchor="architecture">
              <name>SCION network structure</name>
              <artwork><![CDATA[
    ...............................
   :                               :
  :      [TRC]                      :
 :          (::::::::::::::)         :      ......................
:        (::::: ISD core :::::)       :    :                      :
:    (:: +---+ ::::::::: +---+ ::)    :   :    [TRC]               :
: (::::: |CAS|===+---+ : |CAS| :::::) :  :        (: ISD core :)    :
:    (:: +---+ : |CAS|===+---+====)===:==:=====(=+---+ :: +---+ :)  :
:       /(:::::: +---+ ::::::) \      :  :    (: |CAS| == |CAS| :)  :
:      /  (::::::: | :::::::)   \     :  :     ( +---+ :: +---+ )   :
:     /            |             o    :  :       /(::::::::::::)    :
:    o             |           +---+  :  :      /         \         :
:  +---+           |          /|ASb|  :  :     /           \        :
:  |ASa|           |         / +---+  :  :    o             o       :
:  +---+           |        /    |    :  :  +---+          +---+    :
:    |             |       /     |    :  :  |ASx| ---------|ASy|    :
:    |             |      /      o    :  :  +---+          +---+    :
:    o             o     /     +---+  :  :    |                     :
:  +---+         +---+  /      |ASe|  :  :    o                     :
:  |ASc|---------|ASd| o       +---+ -:--:--+---+                   :
:  +---+         +---+                :  :  |ASz|      ISD 2        :
 :                                   :    : +---+                  :
  :            ISD 1                :      ........................
   .................................
Legend:
                      |
                      |
Parent AS - child AS: o
Peering link: ----
Core link: ===
Core AS: CAS
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="routing">
          <name>Routing</name>
          <t>SCION operates on two routing levels: intra-ISD and inter-ISD. Both levels use <strong>path-segment construction beacons (PCBs)</strong> to explore network paths. A PCB is initiated by a core AS and then disseminated either within an ISD (to explore intra-ISD paths) or among core ASes (to explore core paths across different ISDs). The PCBs accumulate cryptographically protected path and forwarding information on AS-level, and store this information in the form of <strong>hop fields (HFs)</strong>. Endpoints use information from these hop fields to create end-to-end forwarding paths for data packets, who carry this information in their packet headers. This concept is called <strong>packet-carried forwarding state (PCFS)</strong>. The concept also supports multi-path communication among endpoints.</t>
          <t>The process of creating an end-to-end forwarding path consists of the following steps:</t>
          <ol spacing="normal" type="1"><li>First, an AS discovers paths to other ASes, during the <em>path exploration</em> (or beaconing) phase.</li>
            <li>The AS then selects a few PCBs according to defined policies, transforms the selected PCBs into path segments, and registers these segments with its path infrastructure, thus making them available to other ASes. This happens during the <em>path registration</em> phase.</li>
            <li>During the <em>path resolution</em> phase, the actual creation of an end-to-end forwarding path to the destination takes place. For this, an endpoint performs (a) a <em>path lookup</em> step, to obtain path segments, and (b) a <em>path combination</em> step, to combine the forwarding path from the segments.</li>
          </ol>
          <t><xref target="beaconing"/> below shows the SCION routing process in a nutshell.</t>
          <figure anchor="beaconing">
            <name>SCION routing in a nutshell</name>
            <artwork><![CDATA[
+------------------+             +------------------+
| Path Exploration |             |                  |
|   (Beaconing)    |------------>|Path Registration |
|                  |             |                  |
+------------------+             +--------+---------+
                                          |
                        +-----------------+
                        |
     +------------------v-----------------------+
     |            Path Resolution               |
     |+--------------+     +-------------------+|
     || Path Lookup  |---->| Path Combination  ||
     |+--------------+     +-------------------+|
     +------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="isd-and-as-numbering">
            <name>ISD and AS numbering</name>
            <t>SCION decouples endpoint addressing from inter-domain routing. Routing is based on the &lt;ISD, AS&gt; tuple, agnostic of endpoint addressing. Existing AS numbers are inherited from the current Internet, but a 48-bit namespace allows for additional SCION AS numbers beyond the 32-bit space in use today. The endpoint local address is not used for inter-domain routing or forwarding, does not need to be globally unique, and can thus be an IPv4, IPv6, or MAC address, for example. A SCION address is therefore composed of the &lt;ISD, AS, local address&gt; 3-tuple.</t>
          </section>
        </section>
        <section anchor="infra-components">
          <name>Infrastructure Components</name>
          <t>The control service is responsible for the path exploration and registration processes in the control plane. It is the main control-plane infrastructure component within each SCION AS. The control service of an AS has the following tasks:</t>
          <ul spacing="normal">
            <li>Generating, receiving, and propagating PCBs. Periodically, the control service of a core AS generates a set of PCBs, which are forwarded to the child ASes or neighboring core ASes. In the latter case, the PCBs are sent over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>Selecting and registering the set of path segments via which the AS wants to be reached.</li>
            <li>Managing certificates and keys to secure inter-AS communication. Each PCB contains signatures of all on-path ASes. Every time the control service of an AS receives a PCB, it validates the PCB's authenticity. When the control service lacks an intermediate certificate, it can query the control service of the neighboring AS that sent the PCB.</li>
          </ul>
          <t><strong>Note:</strong> The control service of an AS must not be confused with a border router. The control service of a specific AS is part of the control plane and responsible for <em>finding and registering suitable paths</em>. It can be deployed anywhere inside the AS. A border router belongs to the data plane; its main task is to <em>forward data packets</em>. Border routers are deployed at the edge of an AS.</t>
        </section>
        <section anchor="formal-verification">
          <name>Formal Verification</name>
          <t>An additional feature of SCION is its formal verification. The SCION network system consists of a variety of components such as routers, servers, and edge devices. Such a complex system eludes the mental capacities of human beings for considering all possible states and interactions. That is why SCION includes a formal verification framework developed by the Department of Computer Science of the ETH Zurich <xref target="KLENZE2021"/>. This guarantees that packet forwarding as well as SCION's authentication mechanisms and implementations are correct and consistent.</t>
        </section>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="key">
      <name>Key Concepts</name>
      <t>This section explains the SCION key concepts, including authentication, control- and data plane.</t>
      <section anchor="authentication">
        <name>Authentication</name>
        <t>SCION's control plane relies on a public-key infrastructure called the <strong>control-plane PKI (CP-PKI)</strong>, which is organized on ISD-level. Each ISD can independently build its own roots of trust, defined in a file called <strong>trust root configuration (TRC)</strong>.</t>
        <t><strong>Note</strong>: This section describes the SCION authentication concept on a very high level. A much more detailed description of SCION's authentication is available in <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="the-control-plane-pki-cp-pki">
          <name>The Control-Plane PKI (CP-PKI)</name>
          <t>Trust within each isolation domain is anchored in the trust root configuration (TRC) file. Each TRC contains a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD-policies that specify, for example, the TRC's usage, validity, and future updates. A TRC is a fundamental component of an CP-PKI.</t>
          <t>The initial TRC in an ISD is called the <strong>base TRC</strong>. This base TRC constitutes the ISD's trust anchor. It is signed during a signing ceremony and then distributed throughout the ISD. All entities within the ISD obtain the initial TRC with an offline mechanism such as a USB flash drive provided by a trusted AS, like the relevant ISP, or with an online mechanism that relies on a trust-on-first-use (TOFU) approach. However, all updates to the base TRCs are performed in a straightforward process that does not require any manual or out-of-band action (such as a software update), see <xref target="update">TRC Update and Verification</xref>.</t>
          <t><xref target="chain"/> shows the TRC trust chain and associated certificates. TRC 1 is the base TRC, and TRC 2 and 3 constitute updates to this base TRC. TRC 2 must be verified using the voting certificates in TRC 1. Control-plane (CP) root certificates are used to verify other CP certificates (which are in turn used to verify path-segment construction beacons PCBs).</t>
          <t>Each SCION AS must hold a private key (to sign PCBs) and a certificate attesting that it is the rightful owner of the corresponding public key. One of the main roles of the TRC is thus enabling the verification of <strong>AS certificates</strong> and PCBs.</t>
          <figure anchor="chain">
            <name>TRC contents and trust chain</name>
            <artwork><![CDATA[
                               TRC 2
               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
          </figure>
        </section>
        <section anchor="update">
          <name>TRC Update and Verification</name>
          <t>With a base TRC as trust anchor, TRCs can be updated in a verifiable manner. There are two kinds of TRC updates: regular and sensitive updates. A <em>regular</em> TRC update happens when the TRC's validity period expires. This period is defined by the <em>validity</em> parameter in the TRC. The default is one year. A TRC update is <em>sensitive</em> if and only if critical sections of the TRC are affected (for example, if the set of core ASes is modified). For both regular and sensitive TRC updates, a number of votes (in the form of signatures) must be cast to approve the update. This number of votes is dictated by the voting quorum and set in each TRC with the <em>voting quorum</em> parameter.</t>
        </section>
        <section anchor="dissemination-of-trc-updates">
          <name>Dissemination of TRC Updates</name>
          <t>Information about a TRC update is disseminated via the SCION’s beaconing process, through the path-segment constructions beacons. Each PCB contains the version number of the currently active TRC. If an AS receives a PCB with a TRC version number higher than the locally stored TRC, it requests the PCB-sending AS for the new TRC. The new TRC is verified on the basis of the current one, and is accepted if it contains at least the required quorum of correct signatures by trust roots defined in the current TRC.
This simple dissemination mechanism has two advantages: It is very efficient (as fresh PCBs rapidly reach all ASes), and it avoids circular dependencies with regard to the verification of PCBs and the beaconing process itself (as no server needs to be contacted over unknown paths in order to fetch the updated TRC).</t>
        </section>
        <section anchor="grace-period">
          <name>Grace Period</name>
          <t>At most two TRCs per ISD can be active at the same time. The TRC parameter <em>grace period</em> indicates for how long the currently active TRC can still be active after a new TRC is disseminated. This so-called <strong>grace period</strong> starts at the beginning of the validity period of the new TRC. An older TRC can only be active until either (1) the grace period has passed, or (2) yet a newer TRC is announced. AS certificates are validated by following the chain of trust up to an active TRC.</t>
        </section>
        <section anchor="revocation-and-recovery-from-a-catastrophic-event">
          <name>Revocation and Recovery from a Catastrophic Event</name>
          <t>The TRC dissemination mechanism also enables rapid revocation of trust roots. When a trust root is compromised, the other trust roots can remove it from the TRC and disseminate a new TRC alongside a PCB with a new version number.</t>
          <t>In case of a catastrophic event—such as several private root keys being disclosed due to a critical vulnerability in a cryptographic library—SCION is equipped with a recovery procedure called <strong>trust reset</strong>. This procedure consists of creating a new TRC with fresh, trustworthy keys (and potentially new algorithms), and redistributing this TRC out-of-band. A trust reset effectively establishes a new base TRC for the ISD. It is possible for ISDs to disable trust resets by setting the <em>no trust reset</em> Boolean parameter to "true" in their TRC, with the effect that the entire ISD would have to be abandoned in the event of such a catastrophic compromise (this abandonment would also have to be announced out-of-band).</t>
          <t>The partition of the SCION network into ISDs guarantees that no single entity can take down the entire network. Even if several entities formed a coalition to carry out an attack, the effects of that attack would be limited to one or a few ISDs.</t>
        </section>
      </section>
      <section anchor="scion-control-plane">
        <name>SCION Control Plane</name>
        <t>The SCION control plane is responsible for discovering path segments and making them available to endpoints.</t>
        <t><strong>Note</strong>: This section describes the SCION control plane on a very high level. A much more detailed description of SCION's control plane will follow in a separate internet draft.</t>
        <section anchor="path-exploration">
          <name>Path Exploration</name>
          <t>In SCION, the path segment construction process is referred to as <strong>beaconing</strong>. The <em>control service</em> of each AS is responsible for the beaconing process. The control service generates, receives, and propagates the <strong>path-segment construction beacons (PCBs)</strong> on a regular basis, to iteratively construct path segments.</t>
          <t>There are three types of path segments (note that all path segments can be used to send data traffic in both directions):</t>
          <ul spacing="normal">
            <li>A path segment from a non-core AS to a core AS is an <em>up-path segment</em>.</li>
            <li>A path segment from a core AS to a non-core AS is a <em>down-path segment</em>.</li>
            <li>A path segment between core ASes is a <em>core-path segment</em>.</li>
          </ul>
          <t>All path segments are invertible: A core-path segment can be used bidirectional, and an up-path segment can be converted into a down-path segment, or vice versa, depending on the direction of the end-to-end path.</t>
          <t>Path segment construction is conducted hierarchically on two levels:</t>
          <ul spacing="normal">
            <li>
              <em>Inter-ISD or core beaconing</em> is the process of constructing path segments between core ASes in the same or in different ISDs. During core beaconing, the control service of a core AS either initiates PCBs or propagates PCBs received from neighboring core ASes to other neighboring core ASes. Core beaconing is periodic; PCBs are sent over policy-compliant paths to discover multiple paths between any pair of core ASes.</li>
            <li>
              <em>Intra-ISD beaconing</em> creates path segments from core ASes to non-core ASes. For this, the control service of a core AS creates PCBs and sends them to the non-core child ASes (typically customer ASes). The control service of a non-core child AS receives these PCBs and forwards them to its child ASes, and so on. This procedure continues until the PCB reaches an AS without any customer (leaf AS). As a result, all ASes within an ISD receive path segments to reach the core ASes of their ISD.</li>
          </ul>
          <t>On its way down, a PCB accumulates cryptographically protected path- and forwarding information per traversed AS. At every AS, metadata as well as information about the AS's ingress and egress interfaces (i.e., link identifiers) is added to the PCB. The ingress and egress interface IDs identify connections to neighboring ASes. These IDs only need to be unique within each AS. Therefore, they can be chosen and encoded by each AS independently and without any need for coordination.</t>
          <t>SCION also supports shortcuts and peering links. In a <em>shortcut</em>, a path only contains an up-path and a down-path segment, which can cross over at a non-core AS that is common to both paths. <em>Peering links</em> can be added to up- or down-path segments, resulting in an operation similar to today’s Internet.</t>
          <t>To reduce beaconing overhead and prevent possible forwarding loops, PCBs do not traverse peering links. Instead, peering links are announced along with a regular path in a PCB. If the path segments of both ASes at the end of a peering link contain this peering link, then it is possible to use the peering link to shortcut the end-to-end path (i.e., without going through the core). SCION also supports peering links that cross ISD boundaries, according to SCION’s path transparency property.</t>
          <t><xref target="pcb"/> shows how intra-ISD PCB propagation works, from the ISD's core AS down to child ASes. For the sake of illustration, the interfaces of each AS are numbered with integer values. In practice, each AS can choose any encoding for its interfaces; in fact, only the AS itself needs to understand its encoding. Here, AS F receives two different PCBs via two different links from core AS X. Moreover, AS F uses two different links to send two different PCBs to AS G, each containing the respective egress interfaces. AS G extends the two PCBs and forwards both of them over a single link to a child AS.</t>
          <figure anchor="pcb">
            <name>Intra-ISD PCB propagation from the ISD core down to child ASes</name>
            <artwork><![CDATA[
                                  .-----.
                                 ; Core  :
                        +-----+  : AS X  ;
                        |PCB  |   \ 2 1 / +-----+
                        |Core |    `+-+'  |pcb  |
                        |Out:2|     | |   |core |
                        +--+--+   +-+ |   |out:1|
                           |      |   |   +--+--+
                           v      |   |      |
                                .-+---+.     v
                   .---.       /  2   3 \             .---.
                  (  J  )- - -; 1      4 :- - - - - -(  H  )
                   `---'      :   AS F   ;            `---'
                            +--\7       /
+----------+ +----------+ <-+     6  5
|PCB       | |pcb       |        `+--+'
|Core      | |core      |         |  |
|Out:2     | |out:1     |         |  |
|----------| |----------|         |  |
|AS F      | |as f      |         |  |
|In:2 Out:7| |in:3 out:7|         |  |
|Peer J:1  | |peer j:1  |         |  | +----------+ +----------+
|Peer H:4  | |peer h:4  |         |  | |PCB       | |pcb       |
|          | |          |         |  | |Core      | |core      |
+--+-------+ +--+-------+         |  | |Out:2     | |out:1     |
   |            |                 |  | |----------| |----------|
  <+           <+                 |  | |AS F      | |as f      |
                                  |  | |In:2 Out:5| |in:3 out:5|
         +----------+ +----------+|  | |Peer J:1  | |peer j:1  |
         |PCB       | |pcb       ||  | |Peer H:4  | |peer h:4  |
         |Core      | |core      ||  | |          | |          |
         |Out:2     | |out:1     ||  | +----+-----+ +----+-----+
         |----------| |----------||  |      |            |
         |AS F      | |as f      ||  |      v            v
         |In:2 Out:6| |in:3 out:6||  |
         |Peer J:1  | |peer j:1  ||  |
         |Peer H:4  | |peer h:4  ||  |
         |          | |          ||  |
         +----+-----+ +----+-----+|  |
              |            |     .+--+-.
              v            v   ,' 5  1  `.
                              ;           :
                              :   AS G    ;
                               \         /
                            +---` 4  3 ,'
                          <-+     `--+'
                                     |  +----------+ +----------+
                                     |  |PCB       | |pcb       |
                                     |  |Core      | |core      |
                                     |  |Out:2     | |out:1     |
           +----------+ +----------+ |  |----------| |----------|
           |PCB       | |pcb       | |  |AS F      | |as f      |
           |Core      | |core      | |  |In:2 Out:5| |in:3 out:5|
           |Out:2     | |out:1     | |  |Peer J:1  | |peer j:1  |
           |----------| |----------| |  |Peer H:4  | |peer h:4  |
           |AS F      | |as f      | |  |----------| |----------|
           |In:2 Out:6| |in:3 out:6| |  |AS G      | |as g      |
           |Peer J:1  | |peer j:1  | |  |In:1 Out:3| |in:1 out:3|
           |Peer H:4  | |peer h:4  | |  |          | |          |
           |----------| |----------| |  +----+-----+ +----+-----+
           |AS G      | |as g      | |       |            |
           |In:5 Out:3| |in:5 out:3| v       v            v
           |          | |          |
           +----+-----+ +----+-----+
                |            |
                v            v
]]></artwork>
          </figure>
          <section anchor="security">
            <name>Security</name>
            <t>Each PCB contains signatures of all on-path ASes. Every time a control service receives a PCB, it validates the PCB's authenticity. During this process, the control service can query the control service of the sending AS, for example, when it lacks an intermediate certificate.</t>
          </section>
          <section anchor="policies">
            <name>Policies</name>
            <t>Each AS can independently set policies dictating which PCBs are sent in which time intervals, and to which neighbors. In particular, PCBs do not need to be propagated immediately upon arrival. However, during bootstrapping and if the AS obtains a PCB containing a previously unknown path, the AS should forward the PCB immediately, to ensure quick connectivity establishment.</t>
          </section>
        </section>
        <section anchor="path-registration">
          <name>Path Registration</name>
          <t>Path registration is the process where an AS transforms selected PCBs into path segments, and adds these segments to the relevant path databases, thus making them available to other ASes.</t>
          <t>As mentioned previously, a non-core AS typically receives several PCBs representing several path segments to the core ASes of the ISD the AS belongs to. Out of these PCBs, the non-core AS selects those down-path segments through which it wants to be reached, based on AS-specific selection criteria (see also <xref target="selection">Path-Segment Selection</xref>). The next step is to register the selected down-segments with the control service of the relevant core ASes, according to a process called <em>intra-ISD path-segment registration</em>. As a result, a core AS's control service contains all intra-ISD path segments registered by the non-core ASes of its ISD. In addition, each core AS control service also stores preferred core-path segments to other core ASes, in the <em>core-segment registration</em> process.</t>
          <section anchor="selection">
            <name>Path-Segment Selection</name>
            <t>Among the received PCBs, the control service of an AS must choose (1) a set of PCBs to propagate further, and (2) a set of path segments to register. The selection of these PCBs and path segments is based on a path quality metric. This metric aims at identifying consistent, diverse, efficient, and policy-compliant paths:</t>
            <ul spacing="normal">
              <li>
                <em>Consistency</em> implies that at least one property along the path is uniform, such as an AS capability (e.g., high bandwidth).</li>
              <li>
                <em>Diversity</em> means that the set of paths announced over time are as path-disjoint as possible, in order to provide high-quality multipath options.</li>
              <li>
                <em>Efficiency</em> refers to the length, bandwidth, latency, utilization, and availability of a path, where more efficient paths are naturally preferred.</li>
              <li>
                <em>Policy compliance</em> implies that the path adheres to the AS’s routing policy.</li>
            </ul>
            <t>Based on past PCBs, the AS control service assigns scores to the current set of candidate path segments, and sends the best segments in the next beaconing interval.</t>
            <t>Core beaconing operates similarly to intra-ISD beaconing, except that core PCBs only traverse core ASes. The same path selection metrics apply, where a core AS attempts to forward the set of most desirable paths to its neighbors.</t>
          </section>
        </section>
        <section anchor="path-lookup">
          <name>Path Lookup</name>
          <t>A host (source) who wants to start communication with another host (destination), requires up to three path segments: An up-path segment to reach the ISD core, a core-path segment to reach the destination ISD, and a down-path segment to reach the destination AS. The source host queries the control service in its AS for such segments. The control service has up-path segments stored in its database and furthermore checks if it has appropriate core- and down-path segments in its cache; in this case it returns them immediately.</t>
          <t>If not, the control service in the source AS queries core control services (using locally stored up-path segments) in the source ISD for core-path segments to the destination ISD. Then, it combines up-path segments with the newly retrieved core-path segments, and queries core control services in the remote ISD to fetch remote down-path segments. To improve overall efficiency, the local control service caches the returned path segments and uses parallelism when requesting path segments from core control services. Finally, the local control service returns all path segments to the source host.</t>
          <t>This recursive lookup significantly simplifies the process for endpoints (which only have to send a single query, similar to stub DNS resolvers). The caching strategy ensures that path lookups are fast for frequently used destinations (similar to caching in recursive DNS resolvers).</t>
        </section>
        <section anchor="link-failures">
          <name>Link Failures</name>
          <t>Unlike in the current Internet, link failures are not automatically resolved by the network, but require active handling by endpoints. Since SCION forwarding paths are static, they break when one of the links fails. Link failures are handled by a two-pronged approach that typically masks link failures without any outage to the application and rapidly re-establishes fresh working paths:</t>
          <ul spacing="normal">
            <li>The SCION Control Message Protocol (SCMP) (the SCION equivalent of ICMP) is used for signaling connectivity problems. Instead of relying on application- or transport-layer timeouts, endpoints get immediate feedback from the network if a path stops working, and can quickly switch to an alternative path.</li>
            <li>SCION endpoints are encouraged to use multipath communication by default, thus masking a link failure with another working path. As multipath communication can increase availability (even in environments with very limited path choices), the SCION control services attempt to create, select and announce disjoint paths, and endpoints compose path segments to achieve maximum resilience to path failure. Consequently, most link failures in SCION remain unnoticed by the application, unlike the frequent (albeit mostly brief) outages in the current Internet. See also <xref target="ANDERSEN2001"/>, <xref target="KATZ2012"/>, <xref target="KUSHMAN2007"/>, and <xref target="HITZ2021"/>.</li>
          </ul>
        </section>
      </section>
      <section anchor="scion-data-plane">
        <name>SCION Data Plane</name>
        <t>While the control plane is responsible for providing end-to-end paths, the data plane ensures that packets are forwarded on the selected path. SCION border routers forward packets to the next AS based on the AS-level path in the packet header (which is extended with ingress and egress interface identifiers for each AS), without inspecting the destination address and also without consulting an inter-domain forwarding table. Only the border router at the destination AS needs to inspect the destination address to forward it to the appropriate local endpoint.</t>
        <t>Because SCION splits the information about the locator (the path towards the destination AS) and the identifier (the destination address), the identifier can have any format that the destination AS can interpret--only the destination needs to consider that local identifier (see also <xref target="RFC6830"/>). In other words, an AS can select an arbitrary addressing format for its hosts, e.g., a 4-byte IPv4, 6-byte media access control (MAC) address, 16-byte IPv6, or any other up to 16-byte addressing scheme. A valuable consequence is that hosts with different address types can directly communicate.</t>
        <t>The next two sections describe how an endpoint combines path segments into an end-to-end forwarding path, and how border routers forward packets efficiently.</t>
        <t><strong>Note</strong>: This section describes the SCION data plane on a very high level. A much more detailed description of SCION's data plane will follow in a separate internet draft.</t>
        <section anchor="path-construction-via-segment-combination">
          <name>Path Construction via Segment Combination</name>
          <t>Through the path lookup, the endpoint obtains path segments that must be combined into an end-to-end path. A valid SCION <strong>forwarding path</strong> can be created by combining up to three path segments, in the following ways:</t>
          <ul spacing="normal">
            <li>
              <strong>Immediate combination of path segments</strong>: The last AS on the up-path segment is also the first AS on the down-path segment. In this case, the simple combination of an up-path segment and a down-path segment creates a valid forwarding path.</li>
            <li>
              <strong>AS shortcut</strong>: The up-path segment and down-path segment intersect at a non-core AS. In this case, a shorter forwarding path can be created by removing the extraneous part of the path.</li>
            <li>
              <strong>Peering shortcut</strong>: A peering link exists between the two segments, so a shortcut via the peering link is possible. As in the AS shortcut case, the extraneous path segment is cut off. The peering link could be traversing to a different ISD.</li>
            <li>
              <strong>Combination with a core-path segment</strong>: The last AS on the up-path segment is different from the first AS on the down-path segment. This case requires an additional core-path segment to connect the up- and down-path segment. If the communication remains within the same ISD, a local ISD core-path segment is needed; otherwise, an inter-ISD core-path segment is required.</li>
            <li>
              <strong>On-path</strong>: The destination AS is part of the up-path segment or the source AS is part of the down-path segment; in this case, a single up- or down-path segment, respectively, is sufficient to create a forwarding path.</li>
          </ul>
          <t>Once a forwarding path is chosen, it is encoded in the SCION packet header. This makes inter-domain routing tables unnecessary for border routers: Both the ingress and the egress interface of each AS on the path are encoded as <strong>packet-carried forwarding state (PCFS)</strong> in the packet header. The destination can respond to the source by reversing the end-to-end path from the packet header, or it can perform its own path lookup and combination.</t>
          <t>The SCION packet header contains of a sequence of <strong>hop fields (HFs)</strong>, one HF for each AS that is traversed on the end-to-end path. Each hop field contains the encoded numbers of the ingress and egress links, and thus defines which interfaces may be used to enter and leave an AS. In addition to the hop fields, each path segment contains an <strong>info field (INF)</strong> with basic information about the segment. A host can create an end-to-end forwarding path by extracting info fields and hop fields from path segments, as depicted in <xref target="HFs"/>. The additional meta header (META) contains pointers to the currently active INF and HF.</t>
          <figure anchor="HFs">
            <name>Combining three path segments into a forwarding path</name>
            <artwork><![CDATA[
up-path segment        core-path segment        down-path segment

+-------+              +-------+                +-------+
|+-----+|              |+-----+|                |+-----+|
|+ INF ||----------+   |+ INF ||---+            |+ INF ||-+
|+-----+|          |   |+-----+|   |            |+-----+| |
|+-----+|          |   |+-----+|   |            |+-----+| |
|| hf  ||--------+ |   || hf  ||---+--+         || hf  ||-+--+
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|+-----+|        | |   |+-----+|   |  |         |+-----+| |  |
|| hf  ||-----+  | |   || hf  ||---+--+--+      || hf  ||-+--+--+
|+-----+|     |  | |   |+-----+|   |  |  |      |+-----+| |  |  |
|+-----+|     |  | |   +-------+   |  |  |      +-------+ |  |  |
|| hf  ||--+  |  | |               |  |  |                |  |  |
|+-----+|  |  |  | |   +--------+  |  |  |                |  |  |
+-------+  |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |++ Meta||  |  |  |                |  |  |
           |  |  | |   |++-----+|  |  |  |                |  |  |
           |  |  | |   |+-----+ |  |  |  |                |  |  |
           |  |  | +-->|+ INF | |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+-----+ |  |  |  |                |  |  |
           |  |  |     |+ INF | |<-+  |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+-----+ |     |  |                |  |  |
           |  |  |     |+ INF | |<----+--+----------------+  |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  |     |+-----+ |     |  |                   |  |
           |  |  +---->|| hf  | |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  |        |+-----+ |     |  |                   |  |
           |  +------->|| hf  | |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           |           |+-----+ |     |  |                   |  |
           +---------->|| hf  | |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       |+-----+ |     |  |                   |  |
                       || hf  | |<----+  |                   |  |
                       |+-----+ |        |                   |  |
                       |+-----+ |        |                   |  |
                       || hf  | |<-------+                   |  |
                       |+-----+ |                            |  |
                       |+-----+ |                            |  |
                       || hf  | |<---------------------------+  |
                       |+-----+ |                               |
                       |+-----+ |                               |
                       || hf  | |<------------------------------+
                       |+-----+ |
                       +--------+
                     forwarding path
]]></artwork>
          </figure>
        </section>
        <section anchor="path-authorization">
          <name>Path Authorization</name>
          <t>It is crucial for the data plane that endpoints only use paths constructed and authorized by ASes in the control plane. In particular, endpoints should not be able to craft HFs themselves, modify HFs in authorized path segments, or combine HFs of different path segments (path splicing). This property is called <strong>path authorization</strong> (see <xref target="KLENZE2021"/> and <xref target="LEGNER2020"/>).</t>
          <t>SCION achieves path authorization by creating message-authentication codes (MACs) during the beaconing process. Each AS calculates these MACs using a local secret key (that is only shared between SCION infrastructure elements within the AS) and chains them to the previous HFs. The MACs are then included in the forwarding path as part of the respective HFs.</t>
        </section>
        <section anchor="forwarding">
          <name>Forwarding</name>
          <t>Routers can efficiently forward packets in the SCION architecture. In particular, the absence of inter-domain routing tables and of complex longest-IP-prefix matching performed by current routers enables the construction of more efficient routers.</t>
          <t>During packet forwarding, a SCION border router at the ingress point of the AS verifies that:</t>
          <ul spacing="normal">
            <li>the packet entered through the correct ingress interface corresponding to the information in the HF,</li>
            <li>the HF is still valid, and</li>
            <li>the MAC in the HF is correct.</li>
          </ul>
          <t>If the packet has not yet reached the destination AS, the egress interface number in the HF of the non-destination AS refers to the egress SCION border router of this AS. In this case, the packet can be sent from the ingress SCION border router to the egress SCION border router via native intra-domain forwarding (e.g., IP or MPLS). In case the packet has arrived at the destination AS, the destination AS's border router inspects the destination address and sends the packet to the corresponding host.</t>
        </section>
        <section anchor="intra-as-communication">
          <name>Intra-AS Communication</name>
          <t>SCION routers use IP to communicate within an AS, therefore they rely on existing intra-domain routing protocols, such as Multiprotocol Label Switching (MPLS) or others.</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment</name>
      <t>Adoption of a next-generation architecture is a challenging task, as it needs to be integrated with, and operate alongside existing infrastructure. SCION is designed to coexist with existing intra-domain routing infrastructure, and comprises coexistence and transition mechanisms that facilitate adoption, in accordance to principles defined in <xref target="RFC8170"/>.
The following section discusses practical considerations for deploying SCION and briefly touches on some of the transition mechanisms, with focus on:</t>
      <ul spacing="normal">
        <li>
          <xref target="deployment-as">Autonomous Systems</xref>,</li>
        <li>
          <xref target="deployment-ixp">Internet Exchange Points</xref>, and</li>
        <li>
          <xref target="deployment-end-host">endpoints</xref>, covering both native SCION hosts and SCION to IP encapsulation.</li>
      </ul>
      <t>We then describe some of the early adopters deployment experiences. A more detailed adoption plan is to be outlined in dedicated documents.</t>
      <section anchor="deployment-as">
        <name>Autonomous System Deployment</name>
        <t>A SCION AS needs to deploy the SCION <xref target="infra-components">infrastructure components</xref> and border routers.
Within an AS, SCION is often deployed as an IP overlay on top of the existing network. This way SCION allows to reuse the existing intra-domain network and equipment (e.g., IP, MPLS). Customer-side SCION border routers directly connect to the provider-side border routers using last-mile connections. The SCION design assumes that AS’s internal entities are considered to be trustworthy, therefore the IP overlay or the first-hop routing does not compromise or degrade any security properties SCION delivers.
When it comes to inter-domain communication, an overlay deployment on top of today’s Internet is not desirable, as SCION would inherit issues from  its weak underlay. Thus, inter-AS SCION links are usually deployed in parallel to existing links, in order to preserve its security properties. That is, two SCION border routers from neighbour ASes are directly connected via a layer-2 cross-connection at a common point-of-presence.</t>
        <t>All SCION AS components can be deployed on standard x86 commercial off-the-shelf servers or virtual machines. In fact, SCION border routers do not rely on forwarding tables, therefore they do not require specialized hardware. Practice shows that off-the-shelf hardware can handle up to 100 Gbps links, while a prototype <xref target="DERUITER2021">P4 implementation</xref> showed that it is possible to forward SCION traffic even at terabit speeds.</t>
        <t>Overall, an AS can be connected to SCION without high-impact changes to its network. In addition, use of commodity hardware for both control and data-plane components reduces initial deployment costs.</t>
      </section>
      <section anchor="deployment-ixp">
        <name>Internet Exchange Points</name>
        <t>Internet Exchange Points (IXP) play as important a role for SCION as they do in today's Internet.  SCION can be deployed at existing IXPs following a "big switch" model, where the IXP provides a large L2 switch between multiple SCION ASes. SCION has been deployed following this model at the Swiss Internet Exchange (SwissIX),  currently interconnecting major SCION Swiss ISPs and enterprises through bi-lateral peering over dedicated SCION ports.</t>
        <t>Additionally, thanks to its path-awareness, SCION offers the option of an enhanced deployment model, i.e., to expose the internal topology of an IXP within the SCION control plane. This enables IXP customers to use SCION’s multipath and fast failover capabilities to leverage the IXP’s internal links (including backup links) and to select paths depending on the application’s needs.  IXPs have therefore an incentive to expose their rich internal connectivity, as the benefits from SCION’s multipath capabilities would increase their value for customers and provide them with a competitive advantage.</t>
      </section>
      <section anchor="deployment-end-host">
        <name>Endpoints and Incremental Deployability</name>
        <t>End users can leverage SCION in two different ways: (1) using SCION-aware applications on a <xref target="native-endhost">SCION native endpoint</xref>, or (2) using transparent <xref target="sig">IP-to-SCION conversion</xref>. The benefit of using SCION natively is that the full range of advantages becomes available to applications, at the cost of installing the SCION endpoint stack and making the application SCION-aware. In early deployments, the second approach is often preferred, so that no changes are needed within applications or endpoints.</t>
        <section anchor="native-endhost">
          <name>Native Endpoints</name>
          <t>A SCION native endpoint's stack consists of a dispatcher, which handles all incoming and outgoing SCION packets, and of a SCION daemon, which handles control-plane messages. The latter  fetches paths to remote ASes and provides an API for applications and libraries to interact with the SCION control plane (i.e., for path lookup, SCION extensions). The current SCION implementation uses an UDP/IP underlay for communication between endpoints and SCION routers. This allows reuse of existing intra-domain networking infrastructure. SCION endpoints can optionally use automated bootstrapping mechanisms to retrieve configuration from the network and establish SCION connectivity. This way, clients require no pre-existing network-specific configurations.</t>
        </section>
        <section anchor="sig">
          <name>SCION to IP Gateway (SIG)</name>
          <t>A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
A SIG can be deployed close to the end user (i.e., at branches of an enterprise, on a CPE), or within an ISP's network. In the latter case, the SIG is called carrier-grade SIG, as it serves multiple customers within the AS where it is deployed. This approach has the advantage that it does not require any changes at the customer's premises.
In order to allow incremental deployability and to ease transition from legacy IP-based Internet to SCION, SIGs can be augmented with  mechanisms allowing them to coordinate and automatically exchange IP prefix information. A more detailed description of the SIG and its coordination mechanisms is to be presented in dedicated documents.</t>
        </section>
      </section>
      <section anchor="deploy">
        <name>Deployment Experiences</name>
        <t>SCION has been deployed in production by multiple entities, growing its acceptance among industry. While early deployments started on academic and research networks, SCION has expanded to serve the financial industry, government, and it is being evaluated for the healthcare sector.</t>
        <t>In 2017, SCION was evaluated for production use by a central bank, with the goal of modernising the network interconnecting banks and their branches. SCION was chosen, as it allows moving away from a dedicated private network to a reliable Internet-based solution. SCION connectivity was later extended to support system-critical applications, like the national real-time gross settlement (RTGS) system, connecting all country's banks to exchange real-time payment information.
The network, called Secure Swiss Finance Network or <eref target="https://perma.cc/PU5L-ALPM">SSFN</eref>, is implemented as a SCION ISD, where a federation of three ISPs forms the ISD core.
Financial institutions are themselves SCION ASes and directly connect to one or more of the core ASes. Institutions deploy SCION–IP gateways (SIGs), transparently enabling their traditional IP-based applications to use the SCION network.
The concept of the SCION ISD also provides a mechanism to implement strict governance and access control (through the issuance of AS certificates).</t>
        <t>Besides the SSFN, SCION connectivity has also been adopted by government entities for their international communications. In addition, Swiss higher education institutions are connected thanks to the <eref target="http://scied.scion-architecture.net/">SCI-ED</eref> network.</t>
        <t>In addition to productive deployments, SCION also comprises a global SCION research testbed called <eref target="https://www.scionlab.org">SCIONLab</eref>. It is composed of dozens of globally distributed infrastructure ASes, mostly run by academic institutions. The testbed is open to any user who can easily set up their own AS with the aid of a web-based UI, connect to the network, and run experiments. The setup has been the earliest global deployment of SCION and it has been supporting research and development of path-aware networking and SCION.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently, this document has no request for action to IANA.
However, when full specification of SCION is available, requests for IANA actions are expected regarding the registration of optional packet header fields as well as the coordination of SCION ISD and AS number assignments.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCION has been designed from the outset to offer security by default, and thus there are manifold security considerations. As a matter of fact, SCION's protocol design has been formally verified and the open source router implementation is undergoing formal verification (see also <xref target="KLENZE2021"/>). Describing all security considerations here, therefore, would go beyond the scope of this document. A separate document including all security implications and considerations will follow later.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4264">
          <front>
            <title>BGP Wedgies</title>
            <author fullname="T. Griffin" initials="T." surname="Griffin"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner. In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable. Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies". This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4264"/>
          <seriesInfo name="DOI" value="10.17487/RFC4264"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6830">
          <front>
            <title>The Locator/ID Separation Protocol (LISP)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="V. Fuller" initials="V." surname="Fuller"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="D. Lewis" initials="D." surname="Lewis"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document describes a network-layer-based protocol that enables separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs). No changes are required to either host protocol stacks or to the "core" of the Internet infrastructure. The Locator/ID Separation Protocol (LISP) can be incrementally deployed, without a "flag day", and offers Traffic Engineering, multihoming, and mobility benefits to early adopters, even when there are relatively few LISP-capable sites.</t>
              <t>Design and development of LISP was largely motivated by the problem statement produced by the October 2006 IAB Routing and Addressing Workshop. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6830"/>
          <seriesInfo name="DOI" value="10.17487/RFC6830"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9049">
          <front>
            <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
            <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
              <t>This document contains that catalog and analysis.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9049"/>
          <seriesInfo name="DOI" value="10.17487/RFC9049"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol. Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult. This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="SCHUCHARD2011">
          <front>
            <title>Losing control of the internet: using the data plane to attack the control plane</title>
            <author fullname="Max Schuchard" initials="M." surname="Schuchard">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Yongdae Kim" initials="Y." surname="Kim">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
              <organization>Kansas State University, Manhaattan, KS, USA</organization>
            </author>
            <date month="October" year="2010"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications" value="security"/>
          <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="LABOVITZ2000">
          <front>
            <title>Delayed Internet routing convergence</title>
            <author fullname="Craig Labovitz" initials="C." surname="Labovitz">
              <organization>Microsoft Research, One Microsoft Way, Redmond, WA</organization>
            </author>
            <author fullname="Abha Ahuja" initials="A." surname="Ahuja">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Abhijit Bose" initials="A." surname="Bose">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Farnam Jahanian" initials="F." surname="Jahanian">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <date month="August" year="2000"/>
          </front>
          <seriesInfo name="Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer" value="Communication"/>
          <seriesInfo name="DOI" value="10.1145/347059.347428"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="GRIFFIN1999">
          <front>
            <title>An analysis of BGP convergence properties</title>
            <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <date month="August" year="1999"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 29, no. 4, pp. 277-288"/>
          <seriesInfo name="DOI" value="10.1145/316194.316231"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SAHOO2009">
          <front>
            <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
            <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
              <organization/>
            </author>
            <author fullname="Krishna Kant" initials="K." surname="Kant">
              <organization/>
            </author>
            <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
          </front>
          <seriesInfo name="Computer Communications" value="vol. 32, no. 7-10, pp. 1207-1218"/>
          <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
          <refcontent>Elsevier BV</refcontent>
        </reference>
        <reference anchor="LYCHEV2013">
          <front>
            <title>BGP security in partial deployment: is the juice worth the squeeze?</title>
            <author fullname="Robert Lychev" initials="R." surname="Lychev">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA, USA</organization>
            </author>
            <author fullname="Michael Schapira" initials="M." surname="Schapira">
              <organization>Hebrew University of Jerusalem, Jerusalem, Israel</organization>
            </author>
            <date month="August" year="2013"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 43, no. 4, pp. 171-182"/>
          <seriesInfo name="DOI" value="10.1145/2534169.2486010"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="LI2014">
          <front>
            <title>Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?</title>
            <author fullname="Qi Li" initials="Q." surname="Li">
              <organization/>
            </author>
            <author fullname="Yi-Chun Hu" initials="Y." surname="Hu">
              <organization/>
            </author>
            <author fullname="Xinwen Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <seriesInfo name="Proceedings 2014 Workshop on Security of Emerging Networking" value="Technologies"/>
          <seriesInfo name="DOI" value="10.14722/sent.2014.23001"/>
          <refcontent>Internet Society</refcontent>
        </reference>
        <reference anchor="COOPER2013">
          <front>
            <title>On the risk of misbehaving RPKI authorities</title>
            <author fullname="Danny Cooper" initials="D." surname="Cooper">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Ethan Heilman" initials="E." surname="Heilman">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Kyle Brogle" initials="K." surname="Brogle">
              <organization>Stanford University, Stanford, CA</organization>
            </author>
            <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="ROTHENBERGER2017">
          <front>
            <title>Internet Kill Switches Demystified</title>
            <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <date month="April" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="MORILLO2021">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking</title>
            <author fullname="Reynaldo Morillo" initials="R." surname="Morillo">
              <organization/>
            </author>
            <author fullname="Justin Furuness" initials="J." surname="Furuness">
              <organization/>
            </author>
            <author fullname="Cameron Morris" initials="C." surname="Morris">
              <organization/>
            </author>
            <author fullname="James Breslin" initials="J." surname="Breslin">
              <organization/>
            </author>
            <author fullname="Amir Herzberg" initials="A." surname="Herzberg">
              <organization/>
            </author>
            <author fullname="Bing Wang" initials="B." surname="Wang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="Proceedings 2021 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
          <refcontent>Internet Society</refcontent>
        </reference>
        <reference anchor="KLENZE2021">
          <front>
            <title>Formal Verification of Secure Forwarding Protocols</title>
            <author fullname="Tobias Klenze" initials="T." surname="Klenze">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Christoph Sprenger" initials="C." surname="Sprenger">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="David Basin" initials="D." surname="Basin">
              <organization>ETH Zurich</organization>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 IEEE 34th Computer Security Foundations Symposium" value="(CSF)"/>
          <seriesInfo name="DOI" value="10.1109/csf51468.2021.00018"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="DERUITER2021">
          <front>
            <title>Next-generation internet at terabit speed: SCION in P4</title>
            <author fullname="Joeri de Ruiter" initials="J." surname="de Ruiter">
              <organization>SURF, Utrecht, The Netherlands</organization>
            </author>
            <author fullname="Caspar Schutijser" initials="C." surname="Schutijser">
              <organization>SIDN Labs, Arnhem, The Netherlands</organization>
            </author>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="Proceedings of the 17th International Conference on emerging Networking EXperiments and" value="Technologies"/>
          <seriesInfo name="DOI" value="10.1145/3485983.3494839"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="ANDERSEN2001">
          <front>
            <title>Resilient overlay networks</title>
            <author fullname="David Andersen" initials="D." surname="Andersen">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Hari Balakrishnan" initials="H." surname="Balakrishnan">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Frans Kaashoek" initials="F." surname="Kaashoek">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Robert Morris" initials="R." surname="Morris">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="October" year="2001"/>
          </front>
          <seriesInfo name="Proceedings of the eighteenth ACM symposium on Operating systems" value="principles"/>
          <seriesInfo name="DOI" value="10.1145/502034.502048"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="KATZ2012">
          <front>
            <title>LIFEGUARD: practical repair of persistent route failures</title>
            <author fullname="Ethan Katz-Bassett" initials="E." surname="Katz-Bassett">
              <organization>University of Washington &amp;amp; University of Southern California, Seattle, WA, USA</organization>
            </author>
            <author fullname="Colin Scott" initials="C." surname="Scott">
              <organization>University of California, Berkeley, Berkeley, CA, USA</organization>
            </author>
            <author fullname="David R. Choffnes" initials="D." surname="Choffnes">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Ítalo Cunha" initials="Í." surname="Cunha">
              <organization>Universidade Federal de Minas Gerais, Belo Horizonte, MG, Brazil</organization>
            </author>
            <author fullname="Vytautas Valancius" initials="V." surname="Valancius">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Nick Feamster" initials="N." surname="Feamster">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Harsha V. Madhyastha" initials="H." surname="Madhyastha">
              <organization>University of California, Riverside, Riverside, CA, USA</organization>
            </author>
            <author fullname="Thomas Anderson" initials="T." surname="Anderson">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Arvind Krishnamurthy" initials="A." surname="Krishnamurthy">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <date month="August" year="2012"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 42, no. 4, pp. 395-406"/>
          <seriesInfo name="DOI" value="10.1145/2377677.2377756"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="KUSHMAN2007">
          <front>
            <title>Can you hear me now?!: it must be BGP</title>
            <author fullname="Nate Kushman" initials="N." surname="Kushman">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Srikanth Kandula" initials="S." surname="Kandula">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Dina Katabi" initials="D." surname="Katabi">
              <organization>MIT CSAIL</organization>
            </author>
            <date month="March" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 37, no. 2, pp. 75-84"/>
          <seriesInfo name="DOI" value="10.1145/1232919.1232927"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="PERRIG2017" target="https://doi.org/10.1007/978-3-319-67080-5">
          <front>
            <title>SCION: A Secure Internet Architecture</title>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="P." surname="Szalachowski" fullname="Pawel Szalachowski">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="R." surname="Reischuk" fullname="Raphael Reischuk">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-319-67079-9"/>
        </reference>
        <reference anchor="KING2022" target="https://datatracker.ietf.org/doc/draft-king-irtf-challenges-in-routing/">
          <front>
            <title>Challenges for the Internet Routing Systems Introduced by Semantic Routing</title>
            <author initials="D." surname="King" fullname="Daniel King">
              <organization>Lancaster University</organization>
            </author>
            <author initials="A." surname="Farrel" fullname="Adrian Farrel">
              <organization>Old Dog consulting</organization>
            </author>
            <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
              <organization>Orange</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="HITZ2021" target="https://perma.cc/4H3Q-WZNG">
          <front>
            <title>Demonstrating the reliability and resilience of Secure Swiss Finance Network</title>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://www.usenix.org/conference/usenixsecurity20/presentation/legner">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
        <reference anchor="I-D.rustignoli-scion-components" target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/">
          <front>
            <title>SCION Components Analysis</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
          <front>
            <title>SCION Control-Plane PKI</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 803?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Cyrill Krähenbühl and Juan A. Garcia-Pardo for reviewing this document. We are also indebted to Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter Müller, for writing the book "The Complete Guide to SCION" (see <xref target="CHUAT22"/>), which provides the background information needed to write this informational draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
