<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekater-panrg-scion-overview-06" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="SCION I-D">SCION Overview</title>
    <seriesInfo name="Internet-Draft" value="draft-dekater-panrg-scion-overview-06"/>
    <author initials="C." surname="de Kater" fullname="Corine de Kater">
      <organization>SCION Association</organization>
      <address>
        <email>c_de_kater@gmx.ch</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <author initials="A." surname="Perrig" fullname="Adrian Perrig">
      <organization>ETH Zuerich</organization>
      <address>
        <email>adrian.perrig@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2024" month="May" day="07"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 237?>

<t>The Internet has been successful beyond even the most optimistic expectations and is intertwined with many aspects of our society. But although the world-wide communication system guarantees global reachability, the Internet has not primarily been built with security and high availability in mind. The next-generation inter-network architecture SCION (Scalability, Control, and Isolation On Next-generation networks) aims to address these issues. SCION was explicitly designed from the outset to offer security and availability by default. The architecture provides route control, failure isolation, and trust information for end-to-end communication. It also enables multi-path routing between hosts.</t>
      <t>This document discusses the motivations behind the SCION architecture and gives a high-level overview of its fundamental components, including its authentication model and the setup of the control- and data plane. As SCION is already in production use today, the document concludes with an overview of SCION deployments.</t>
      <t>For detailed descriptions of SCION's components, refer to <xref target="I-D.dekater-scion-pki"/>, <xref target="I-D.dekater-scion-controlplane"/>, and <xref target="I-D.dekater-scion-dataplane"/>. A more detailed analysis of relationships and dependencies between components is available in <xref target="I-D.rustignoli-scion-components"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-overview_I-D/draft-dekater-panrg-scion-overview.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekater-panrg-scion-overview/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-overview_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <?line 245?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Introduction section explores the motivation to develop SCION, followed by a short description of SCION's main elements. The sections after the Introduction provide further insight into SCION's key concepts and deployment scenarios. The document concludes with some concrete case studies where SCION has been successfully deployed in production.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t><strong>MAC</strong>: Message Authentication Code. In the rest of this document, "MAC" always refers to "Message Authentication Code" and never to "Medium Access Control". When "Medium Access Control address" is implied, the phrase "Link Layer Address" is used.</t>
      </section>
      <section anchor="why">
        <name>Why SCION - Motivation</name>
        <t>Since its inception, the Internet has continued to expand, encompassing new uses over time. The continuous expansion has brought many issues to light, including a lack of control, limitations in scalability, performance and security, occurrences of severe outages, weak fault isolation, and energy consumption. With the core focus on functionality and operation, the current Internet offers little protection against attacks such as spoofing, IP-address hijacking, denial-of-service, and combinations of these. For more background information, see <xref target="SCHUCHARD2011"/>, <xref target="LABOVITZ2000"/>, <xref target="GRIFFIN1999"/>, <xref target="SAHOO2009"/>, and <xref target="RFC4264"/>.</t>
        <t>There have been numerous initiatives to address the above issues. Although these initiatives have brought many improvements, concerns regarding security and scalability still remain. For more details, see, e.g., <xref target="RFC4033"/>, <xref target="RFC6480"/>, <xref target="RFC8205"/>, and <xref target="RFC8446"/>, as well as <xref target="LYCHEV2013"/>, <xref target="LI2014"/>, <xref target="COOPER2013"/>, <xref target="ROTHENBERGER2017"/>, <xref target="MORILLO2021"/>, and <xref target="KING2022"/>.</t>
        <t>As a consequence, today's Internet fails to fulfil many users' requirements. This especially pertains to the demands of enterprises globally exchanging sensitive information, such as financial institutions, healthcare providers, universities, multinationals, governments, critical and transportation infrastructure operators. These users require the Internet to be highly available at all times. They expect reliable operation of the global network also in case of failures. They need availability guarantees across multiple routing domains, even in the presence of attacks. They further want to rely on an Internet that can be multilaterally governed and is free from global kill-switches.</t>
        <t>SCION has been developed in order to meet the above-mentioned requirements. SCION aims to reach the following goals:</t>
        <ul spacing="normal">
          <li>
            <t>Provide high-availability architecture (also in the presence of adversaries)</t>
          </li>
          <li>
            <t>Provide fast failover in the case of inter-domain link or router failures</t>
          </li>
          <li>
            <t>Prevent from IP-address hijacking, DoS, and other attacks</t>
          </li>
          <li>
            <t>Enable path transparency as well as application-specific path optimizations</t>
          </li>
          <li>
            <t>Improve the inter-domain control plane's scalability</t>
          </li>
          <li>
            <t>Prepare the Internet for tomorrow's applications, such as virtual reality, Internet of Things (IoT), and all other applications requiring high-performance connectivity.</t>
          </li>
        </ul>
        <section anchor="scope-of-scion">
          <name>Scope of SCION</name>
          <t>The above section describes SCION's aspiration to improve <em>inter</em>-AS routing and to focus on providing end-to-end connectivity. However, SCION does not solve <em>intra</em>-AS routing issues, nor does it provide end-to-end payload encryption, and identity authentication. These topics, which are equally important for the Internet to perform well, lie outside the scope of SCION.</t>
        </section>
        <section anchor="practical-considerations-based-on-related-rfcs">
          <name>Practical Considerations Based on Related RFCs</name>
          <t>The SCION inter-domain routing concept has initially been developed by researchers of the ETH Zuerich <xref target="PERRIG2017"/>, and could in the meantime also gain attention and recognition in the international academic world. However, for an IT architecture to be successful, it must work well in practice, too. This section pays attention to the implementation considerations of a conceptual framework such as SCION in real life, on the basis of some RFCs exploring this topic. It also verifies in how far SCION meets the requirements mentioned and questions raised in these RFCs.</t>
          <section anchor="avoiding-pitfalls">
            <name>Avoiding Pitfalls</name>
            <t><xref target="RFC9049"/> describes why previous proposals to tackle some of the Internet's fundamental issues did not manage to succeed. SCION seems to avoid the pitfalls mentioned in that document. For example, SCION does not have to be adopted by the entire Internet to be effective: The routing architecture provides benefits already to early adapters. Even if only a small part of the global network works with SCION, adapters will still take advantage of using the SCION routing technology. Moreover, not only users of SCION benefit from it, also ISPs and operators benefit from deploying SCION: early deployments showed that providers can charge the use of SCION as premium connectivity, with users who are willing to pay for it. Furthermore, SCION can be installed on top of and function alongside the existing routing infrastructure and protocols--there is no need for high-impact changes in an operational network.</t>
            <t>Another RFC that must be mentioned in this context is <xref target="RFC5218"/>, "What Makes for a Successful Protocol?". SCION seems to fulfil most factors that contribute to the success of a protocol, as described in section 2.1 of the RFC. This includes such factors as offering a positive net value (i.e., the benefits of deploying SCION outweigh the costs), incremental deployability, and open source code availability. More importantly, SCION averts the failure criteria mentioned in section 1.4 of the RFC: SCION is already deployed and in use by many actors of the Swiss financial and academic ecosystems, and allows for multiple implementations, both open and closed source. As existing SCION implementations are easily portable, adoption in mainstream platforms is also possible.</t>
          </section>
          <section anchor="answering-questions">
            <name>Answering Questions</name>
            <t>SCION can be considered a <em>path-aware internetworking</em> architecture, as described in <xref target="RFC9217"/>. This RFC poses (open) questions that must be answered in order to realize such a path-aware networking system. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            <t>SCION intends to answer the questions raised in this RFC. This especially pertains to the second, third, seventh, and eighth question:</t>
            <ul spacing="normal">
              <li>
                <t>How do endpoints and applications get access to accurate, useful, and trustworthy path properties?</t>
              </li>
              <li>
                <t>How can endpoints select paths to use for traffic in a way that can be trusted by the network, the endpoints, and the applications using them?</t>
              </li>
              <li>
                <t>How can a path-aware network in a path-aware internetwork be effectively operated, given control inputs from network administrators, application designers, and end users?</t>
              </li>
              <li>
                <t>How can the incentives of network operators and end users be aligned to realize the vision of path-aware networking, and how can the transition from current ("path-oblivious") to path-aware networking be managed?</t>
              </li>
            </ul>
            <t>SCION's answers to these questions can be found in <xref target="key">Key Concepts</xref> and <xref target="deploy">Deployments</xref>, respectively.</t>
          </section>
        </section>
        <section anchor="why-now">
          <name>Why Now?</name>
          <t>The emergence of multiple SCION implementations and early deployments highlights the need for standardization. The time seems therefore ripe to take SCION to the IETF, also in order to contribute to the important discussion regarding path-aware networking.</t>
        </section>
      </section>
      <section anchor="scion-overview">
        <name>SCION Overview</name>
        <t>SCION has been designed to address the fundamental issues of today's Internet depicted in <xref target="why">Why SCION - Motivation</xref>. The following section gives a high-level overview of SCION's main elements, providing a basic understanding of this next-generation inter-network architecture.</t>
        <section anchor="network-architecture-and-naming">
          <name>Network Architecture and Naming</name>
          <t>SCION's main goal is to offer highly available and efficient inter-domain packet delivery—even in the presence of actively malicious entities. To achieve scalability and sovereignty, SCION organizes existing ASes into groups of independent routing planes, called <strong>Isolation Domains (ISD)</strong>. An AS can be a member of multiple ISDs. All ASes in an ISD agree on a set of trust roots, called the <strong>Trust Root Configuration (TRC)</strong>. The ISD is governed by a set of <strong>core ASes</strong>, which provide connectivity to other ISDs and manage the trust roots. Typically, a few distinguished ASes within an ISD form the ISD’s core.</t>
          <t>Isolation domains serve the following purposes:</t>
          <ul spacing="normal">
            <li>
              <t>They allow SCION to support trust heterogeneity, as each ISD can independently define its roots of trust;</t>
            </li>
            <li>
              <t>They provide transparency for trust relationships;</t>
            </li>
            <li>
              <t>They isolate the routing process within an ISD from external influences such as attacks and misconfigurations; and</t>
            </li>
            <li>
              <t>They improve the scalability of the routing protocol by separating it into a process within and one between ISDs.</t>
            </li>
          </ul>
          <t>ISDs provide natural isolation of routing failures and misconfigurations, provide meaningful and enforceable trust, enable endpoints to optionally restrict traffic forwarding to trusted parts of the Internet infrastructure only, and enable scalable routing updates with high path-freshness.</t>
          <section anchor="links">
            <name>Links</name>
            <t>Within and between ISDs, SCION supports three types of links: (1) core links, (2) parent-child links, and (3) peering links.</t>
            <ul spacing="normal">
              <li>
                <t>A <strong>core link</strong> always connects two core ASes, which are either within the same or in a different ISD. Core links can exist for various underlying business relationships, including provider-customer (where the customer pays the provider for traffic) and peering relationships.</t>
              </li>
              <li>
                <t>A <strong>parent-child link</strong> creates a hierarchy between the parent and the child. ASes with a parent-child link typically have a provider-customer relationship.</t>
              </li>
              <li>
                <t><strong>Peering links</strong> exist between ASes with a (settlement-free or paid) peering relationship. Peering links can only be used to reach destinations within or downstream of the peering AS. They can be established between any two core or non-core ASes, and between core and non-core ASes. Peering links can also cross ISD boundaries.</t>
              </li>
            </ul>
            <t>See <xref target="architecture"/> for a high-level overview of the SCION network structure.</t>
            <figure anchor="architecture">
              <name>SCION network structure</name>
              <artwork><![CDATA[
+-------------------------------------+
|                                     |
| +-[TRC]---------------------------+ |  +----------------------------+
| |       ISD Core                  | |  | +-[TRC]------------------+ |
| |                                 | |  | |            ISD Core    | |
| | .---.        .---.       .---.  | |  | | .---.        .---.     | |
| |(CAS A)*----*(CAS B)*---*(CAS C)*--------*CAS I)*----*(CAS J)    | |
| | `-#-'        `-#-'       `-#-'  | |  | | `-#-'        `-#-'     | |
| |   |            |           |    | |  | |   |            |       | |
| |   |            |           |    | |  | |   |            |       | |
| |   |            |           |    | |  | |   |            |       | |
| +---|------------|-----------|----+ |  | +---|------------+-------+ |
|     |            |           |      |  |     |            |         |
|   .-0-.          |         .-0-.    |  |   .-0-.        .-0-.       |
|  (AS D )         |    +---# AS E)   |  |  (AS K )< - ->( AS L)      |
|   `-#-'          |    |    `-#-'    |  |   `-#-'        `---'       |
|     |            |    |      |      |  |     |                      |
|     |            |    |      |      |  |     |                      |
|     |            |    |      |      |  |     |           ISD 2      |
|     |            |    |      |      |  |     |                      |
|     |            |    |      |      |  |     |                      |
|   .-0-.        .-0-0--+    .-0-.    |  |   .-0-.                    |
|  (AS F )< - ->( AS G)     (AS H )< -|- - >(AS M )                   |
|   `---'        `---'       `---'    |  |   `---'                    |
|                                     |  +----------------------------+
|                                     |
|   ISD 1                             |
|                                     |
+-------------------------------------+

 parent-child link #-------0    CAS: core AS
         core link *-------*    TRC: trust root configuration
      peering link < - - - >
]]></artwork>
            </figure>
          </section>
        </section>
        <section anchor="routing">
          <name>Routing</name>
          <t>SCION provides path-aware inter-domain routing between ASes across the Internet. The SCION control plane is responsible for discovering these inter-domain paths and making them available to the endpoints within the ASes. SCION inter-domain routing operates on two levels: Within a SCION isolation domain (ISD), which is called <em>intra</em>-ISD routing, and between ISDs, called <em>inter</em>-ISD routing. Both levels use the so-called <em>path-segment construction beacons (PCBs)</em> to explore network paths. A PCB is initiated by a core AS and then disseminated either within an ISD to explore intra-ISD paths, or among core ASes, to explore core paths across different ISDs.</t>
          <t>The PCBs accumulate cryptographically protected path and forwarding information on AS-level, and store this information in the form of <em>hop fields</em>. Endpoints use information from these hop fields to create end-to-end forwarding paths for data packets, who carry this information in their packet headers. This concept is called <em>packet-carried forwarding state</em>. The concept also supports multi-path communication among endpoints.</t>
          <t>The creation of an end-to-end forwarding path consists of the following processes:</t>
          <ul spacing="normal">
            <li>
              <t><em>Path exploration (or beaconing)</em>: This is the process where an AS discovers paths to other ASes.</t>
            </li>
            <li>
              <t><em>Path registration</em>: This is the process where an AS selects a few PCBs, according to defined policies, turns the selected PCBs into path segments, and adds these path segments to the relevant path infrastructure, thus making them available to other ASes.</t>
            </li>
            <li>
              <t><em>Path resolution</em>: This is the process of actually creating an end-to-end forwarding path from the source endpoint to the destination. For this, an endpoint performs (a) a path lookup step, to obtain path segments, and (b) a path combination step, to combine the forwarding path from the segments. This last step takes place in the data plane.</t>
            </li>
          </ul>
          <t>All processes operate concurrently.</t>
          <t>For detailed information on path exploration, registration, and lookup, see <xref target="I-D.dekater-scion-controlplane"/>. For a detailed description of the path combination and construction process, see <xref target="I-D.dekater-scion-dataplane"/>.</t>
          <t><xref target="beaconing"/> below shows the SCION routing processes and their relation to each other.</t>
          <figure anchor="beaconing">
            <name>SCION routing processes and their relation to each other. All processes operate concurrently.</name>
            <artwork><![CDATA[
+-------------------------+       +-------------------------+
| Exploration (Beaconing) |------>|      Registration       |
+-------------------------+       +-----------+-------------+
                                              |
                              +---------------+
                              |
     +------------------------v------------------------+
     |                 Path Resolution                 |
     |                                                 |
     |   +----------------+       +----------------+   |
     |   |     Lookup     +------>|  Combination   |   |
     |   |                |       |    (Data Plane)|   |
     |   +----------------+       +----------------+   |
     +-------------------------------------------------+
]]></artwork>
          </figure>
          <section anchor="path-segments">
            <name>Path Segments</name>
            <t>As described previously, the main goal of SCION's control plane is to create and manage path segments, which can then be combined into forwarding paths to transmit packets in the data plane. SCION distinguishes the following types of path segments:</t>
            <ul spacing="normal">
              <li>
                <t>A path segment from a non-core AS to a core AS is an <strong>up-segment</strong>.</t>
              </li>
              <li>
                <t>A path segment from a core AS to a non-core AS is a <strong>down-segment</strong>.</t>
              </li>
              <li>
                <t>A path segment between core ASes is a <strong>core-segment</strong>.</t>
              </li>
            </ul>
            <t>Each path segment either ends at a core AS, or starts at a core AS, or both.</t>
            <t><strong>Note</strong>: There are no SCION path segments that start and end at a non-core AS. However, when combining path segments into an end-to-end SCION path, it is possible to use peering links.</t>
            <t>All path segments are invertible: A core-segment can be used bidirectionally, and an up-segment can be converted into a down-segment, or vice versa, depending on the direction of the end-to-end path. This means that all path segments can be used to send data traffic in both directions.</t>
          </section>
          <section anchor="isd-and-as-numbering">
            <name>ISD and AS numbering</name>
            <t>The inter-domain SCION routing is based on the &lt;ISD, AS&gt; tuple. Although a complete SCION address is composed of the &lt;ISD, AS, endpoint address&gt; 3-tuple, the endpoint address is not used for inter-domain routing or forwarding. The endpoint address can be of variable length, does not need to be globally unique, and can thus be an IPv4, IPv6, or link layer address, for example - in fact, the endpoint address is the "normal", currently used, non-SCION-specific endpoint address.</t>
            <t><strong>Note</strong>: As a consequence of the fact that SCION relies on existing routing protocols (e.g., IS-IS, OSPF, SR) and communication fabric (e.g., IP, MPLS) for intra-domain forwarding, existing internal routers do not need to be changed to support SCION.</t>
          </section>
          <section anchor="infra-components">
            <name>Control Service</name>
            <t>The <strong>control service</strong> is responsible for the path exploration and registration processes in the control plane. It is the main control-plane infrastructure component within each SCION AS. The control service of an AS has the following tasks:</t>
            <ul spacing="normal">
              <li>
                <t>Generating, receiving, and propagating PCBs. Periodically, the control service of a core AS generates a set of PCBs, which are forwarded to the child ASes or neighboring core ASes. In the latter case, the PCBs are sent over policy-compliant paths to discover multiple paths between any pair of core ASes.</t>
              </li>
              <li>
                <t>Selecting and registering the set of path segments via which the AS wants to be reached.</t>
              </li>
              <li>
                <t>Managing certificates and keys to secure inter-AS communication. Each PCB contains signatures of all on-path ASes. Every time the control service of an AS receives a PCB, it validates the PCB's authenticity. When the control service lacks an intermediate certificate, it can query the control service of the neighboring AS that sent the PCB.</t>
              </li>
            </ul>
            <t><strong>Note:</strong> The control service of an AS must not be confused with a border router. The control service of a specific AS is part of the control plane and responsible for <em>finding and registering suitable paths</em>. It can be deployed anywhere inside the AS. A border router belongs to the data plane; its main task is to <em>forward data packets</em>. Border routers are deployed at the edge of an AS.</t>
          </section>
        </section>
        <section anchor="link-failures">
          <name>Link Failures</name>
          <t>Unlike in the current Internet, link failures are not automatically resolved by the network, but require active handling by endpoints. Since SCION forwarding paths are static, they break when one of the links fails. Link failures are handled by a two-pronged approach that typically masks link failures without any outage to the application and rapidly re-establishes fresh working paths:</t>
          <ul spacing="normal">
            <li>
              <t>The SCION Control Message Protocol (SCMP) (the SCION equivalent of ICMP) is used for signaling connectivity problems. Instead of relying on application- or transport-layer timeouts, endpoints get immediate feedback from the network if a path stops working, and can quickly switch to an alternative path.</t>
            </li>
            <li>
              <t>SCION endpoints are encouraged to use multipath communication by default, thus masking a link failure with another working path. As multipath communication can increase availability (even in environments with very limited path choices), the SCION control services attempt to create, select and announce disjoint paths, and endpoints compose path segments to achieve maximum resilience to path failure. Consequently, most link failures in SCION remain unnoticed by the application, unlike the frequent (albeit mostly brief) outages in the current Internet. See also <xref target="ANDERSEN2001"/>, <xref target="KATZ2012"/>, <xref target="KUSHMAN2007"/>, and <xref target="HITZ2021"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="formal-verification">
          <name>Formal Verification</name>
          <t>An additional feature of SCION is its formal verification. The SCION network system consists of a variety of components such as routers, servers, and edge devices. Such a complex system eludes the mental capacities of human beings for considering all possible states and interactions. That is why SCION includes a formal verification framework developed by the Department of Computer Science of the ETH Zurich <xref target="KLENZE2021"/>. This guarantees that packet forwarding as well as SCION's authentication mechanisms and implementations are correct and consistent.</t>
        </section>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="key">
      <name>Key Concepts</name>
      <t>This section explains the SCION key concepts, including authentication, control- and data plane.</t>
      <section anchor="the-control-plane-pki">
        <name>The Control-Plane PKI</name>
        <t>SCION's control plane relies on a public-key infrastructure called the <strong>control-plane PKI (CP-PKI)</strong>, which is organized on ISD-level. Each ISD can independently build its own roots of trust, defined in a file called <strong>trust root configuration (TRC)</strong>.</t>
        <t><strong>Note</strong>: This document describes the SCION control-plane PKI on a very high level. For a detailed specification of the SCION control-plane PKI, see <xref target="I-D.dekater-scion-pki"/>.</t>
        <section anchor="control-plane-pki-overview">
          <name> Control-Plane PKI - Overview</name>
          <t>Authentication in SCION is based on digital certificates that bind identifiers to public keys and carry digital signatures that are verified by roots of trust. SCION allows each ISD to define its own set of trust roots, along with the policy governing their use. Such scoping of trust roots within an ISD improves security, as compromise of a private key associated with a trust root cannot be used to forge a certificate outside the ISD. An ISD's trust roots and policy are encoded in the TRC, which has a version number, a list of public keys that serves as root of trust for various purposes, and policies governing the number of signatures required for performing different types of actions. The TRC serves as a way to bootstrap all authentication within SCION. Additionally, TRC versioning is used to efficiently revoke compromised roots of trust.</t>
          <t>Each TRC consists of a collection of signed root certificates, which are used to sign CA certificates, which are in turn used to sign AS certificates. The TRC also includes ISD-policies that specify, for example, the TRC's usage, validity, and future updates. A TRC is a fundamental component of an ISD's control-plane PKI. The so-called <strong>base TRC</strong> constitutes the ISD's trust anchor and is thus axiomatically trusted. It is signed during a signing ceremony by so-called voting ASes and then distributed throughout the ISD. All ASes within an ISD must be pre-loaded with the currently valid base TRC of their own ISD.</t>
        </section>
        <section anchor="overview-of-certificates-keys-and-roles">
          <name> Overview of Certificates, Keys, and Roles</name>
          <t>All certificates used in SCION's control-plane PKI are in X.509 v3 format <xref target="RFC5280"/>. Additionally, the TRC contains self-signed certificates instead of plain public keys. Self-signed certificates have the following advantages over plain public keys: (1) They make the binding between name and public key explicit; and (2) the binding is signed to prove possession of the corresponding private key.</t>
          <t>All ASes in SCION have the task to sign and verify control-plane messages. However, certain ASes have additional roles:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Core ASes</strong>: Core ASes are a distinct set of ASes in the SCION control plane. For each ISD, the core ASes are listed in the TRC. Each core AS in an ISD has links to other core ASes (in the same or in different ISDs).</t>
            </li>
            <li>
              <t><strong>Certification authorities (CAs)</strong>: CAs are responsible for issuing AS certificates to other ASes and/or themselves.</t>
            </li>
            <li>
              <t><strong>Voting ASes</strong>: Only certain ASes within an ISD may sign TRC updates. The process of appending a signature to a new TRC is called "casting a vote"; the designated ASes that hold the private keys to sign a TRC update are "voting ASes".</t>
            </li>
            <li>
              <t><strong>Authoritative ASes</strong>: Authoritative ASes are those ASes in an ISD that always have the latest TRCs of the ISD. They start the announcement of a TRC update.</t>
            </li>
          </ul>
        </section>
        <section anchor="trc-updates">
          <name>TRC Updates</name>
          <t>There are two types of TRC updates: regular and sensitive. A <em>regular</em> TRC update is a periodic re-issuance of the TRC where the entities and policies listed in the TRC remain unchanged, whereas a <em>sensitive</em> TRC update is an update that modifies critical aspects of the TRC, such as the set of core ASes. In both cases, the base TRC remains unchanged. If the ISD's TRC has been compromised, it is necessary for an ISD to re-establish the trust root. This is possible with a process called trust reset (if allowed by the ISD's trust policy). In this case, a new base TRC is created. For more details on a trust reset, see <xref target="reset"/>.</t>
          <t><xref target="chain"/> shows the TRC trust chain and associated certificates. TRC 1 is the base TRC, and TRC 2 and 3 constitute updates to this base TRC. TRC 2 must be verified using the voting certificates in TRC 1. Control-plane (CP) root certificates are used to verify other CP certificates (which are in turn used to verify path-segment construction beacons PCBs).</t>
          <figure anchor="chain">
            <name>Chain of trust within an ISD</name>
            <artwork><![CDATA[
                               TRC 2
               +--------------------------------------+
               |+------------------------------------+|
               ||- Version       - Core ASes         ||
+--------+     ||- ID            - Description       ||    +--------+
| TRC 1  |     ||- Validity      - No Trust Reset    ||    | TRC 3  |
| (Base  |---->||- Grace Period  - Voting Quorum     ||--->|        |
|  TRC)  |     ||- ...                               ||    |        |
+--------+     |+------------------------------------+|    +--------+
               |+----------------+  +----------------+|
               || Regular Voting |  |Sensitive Voting||
               ||  Certificate   |  |  Certificate   ||
               |+----------------+  +----------------+|
               |+----------------+  +----------------+|
               ||     Votes      |  |   Signatures   ||
               |+----------------+  +----------------+|
               |+------------------------------------+|
               ||        CP Root Certificates        ||
               |+----------+-------------+-----------+|
               |           |             |            |
               +-----------+-------------+------------+
                           |             |
                           |             |
                           v             v
                 +-----------+         +-----------+
                 |   CP CA   |         |   CP CA   |
                 |Certificate|         |Certificate|
                 +-+-------+-+         +-----+-----+
                   |       |                 |
                   |       |                 |
                   v       v                 v
          +-----------+ +-----------+      +-----------+
          |   CP AS   | |   CP AS   |      |   CP AS   |
          |Certificate| |Certificate|      |Certificate|
          +-----------+ +-----------+      +-----------+
]]></artwork>
          </figure>
          <section anchor="discovering-trc-updates">
            <name>Discovering TRC Updates</name>
            <t>SCION provides the following mechanisms for discovering TRC updates:</t>
            <ul spacing="normal">
              <li>
                <t><em>Beaconing Process</em>: The TRC version is announced in the beaconing process. Each AS must announce what it considers to be the latest TRC. Furthermore, each AS must include the hash value of the TRC contents to facilitate the discovery of discrepancies. Therefore, relying parties that are part of the beaconing process discover TRC updates passively: A core AS notices TRC updates for remote ISDs that are on the beaconing path. A non-core AS only notices TRC updates for the local ISD through the beaconing process, if it receives a PCB with a TRC version number higher than the locally stored TRC. The creation of a new TRC should trigger the generation of new control-plane messages, as the propagation of control-plane messages will help other ASes rapidly discover the new TRC. This simple dissemination mechanism has two advantages: (1) It is very efficient (as fresh PCBs rapidly reach all ASes), and (2) it avoids circular dependencies with regard to the verification of PCBs and the beaconing process itself (as no server needs to be contacted over unknown paths in order to fetch the updated TRC).</t>
              </li>
              <li>
                <t><em>Path Lookup</em>: In every path segment, all ASes must reference the latest TRC of their ISD. Therefore, when resolving paths, every relying party will notice TRC updates, even remote ones. Note that this mechanism only works when there is an active communication between the relying party and the ISD in question.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="reset">
          <name>Revocation and Recovery from a Catastrophic Event</name>
          <t>The TRC dissemination mechanism also enables rapid revocation of trust roots. When a trust root is compromised, the other trust roots can remove it from the TRC and disseminate a new TRC alongside a PCB with a new version number.</t>
          <t>In case of a catastrophic event—such as several private root keys being disclosed due to a critical vulnerability in a cryptographic library—SCION is equipped with a recovery procedure called <strong>trust reset</strong>. This procedure consists of creating a new TRC with fresh, trustworthy keys (and potentially new algorithms), and redistributing this TRC out-of-band. A trust reset effectively establishes a new base TRC for the ISD. It is possible for ISDs to disable trust resets by setting the <em>no trust reset</em> Boolean parameter to "true" in their TRC, with the effect that the entire ISD would have to be abandoned in the event of such a catastrophic compromise (this abandonment would also have to be announced out-of-band).</t>
          <t>The partition of the SCION network into ISDs guarantees that no single entity can take down the entire network. Even if several entities formed a coalition to carry out an attack, the effects of that attack would be limited to one or a few ISDs.</t>
        </section>
      </section>
      <section anchor="scion-control-plane">
        <name>SCION Control Plane</name>
        <t>The SCION control plane is responsible for discovering path segments and making them available to endpoints.</t>
        <t><strong>Note</strong>: This section describes the SCION control plane on a very high level. For a detailed specification of the SCION control plane, see <xref target="I-D.dekater-scion-controlplane"/>.</t>
        <section anchor="path-exploration">
          <name>Path Exploration</name>
          <t>Path exploration is the process where an AS discovers paths to other ASes. In SCION, this process is referred to as <strong>beaconing</strong>. This section gives a high level explanation of the SCION beaconing process.</t>
          <t>In SCION, the <em>control service</em> of each AS is responsible for the beaconing process. The control service generates, receives, and propagates so-called <strong>path-segment construction beacons (PCBs)</strong> on a regular basis, to iteratively construct path segments. PCBs contain topology and authentication information, and can also include additional metadata that helps with path management and selection. The beaconing process itself is divided into routing processes on two levels, where <em>inter</em>-ISD or core beaconing is based on the (selective) sending of PCBs without a defined direction, and <em>intra</em>-ISD beaconing on top-to-bottom propagation.</t>
          <ul spacing="normal">
            <li>
              <t><em>Inter-ISD or core beaconing</em> is the process of constructing path segments between core ASes in the same or in different ISDs. During core beaconing, the control service of a core AS either initiates PCBs or propagates PCBs received from neighboring core ASes to other neighboring core ASes. Core beaconing is periodic; PCBs are sent over policy-compliant paths to discover multiple paths between any pair of core ASes.</t>
            </li>
            <li>
              <t><em>Intra-ISD beaconing</em> creates path segments from core ASes to non-core ASes. For this, the control service of a core AS creates PCBs and sends them to the non-core child ASes (typically customer ASes). The control service of a non-core child AS receives these PCBs and forwards them to its child ASes, and so on. This procedure continues until the PCB reaches an AS without any customer (leaf AS). As a result, all ASes within an ISD receive path segments to reach the core ASes of their ISD.</t>
            </li>
          </ul>
          <t>On its way, a PCB accumulates cryptographically protected path- and forwarding information per traversed AS. At every AS, metadata as well as information about the AS's ingress and egress interfaces (i.e., link identifiers) are added to the PCB. The ingress and egress interface IDs identify connections to neighboring ASes. These IDs only need to be unique within each AS. Therefore, they can be chosen and encoded by each AS independently and without any need for coordination.</t>
          <t>SCION also supports shortcuts and peering links. In a <em>shortcut</em>, a path only contains an up-path and a down-path segment, which can cross over at a non-core AS that is common to both paths. <em>Peering links</em> can be added to up- or down-path segments, resulting in an operation similar to today’s Internet.</t>
          <t>Note that PCBs do not traverse peering links. Instead, peering links are announced along with a regular path in a PCB. If both ASes at either end of a peering link have registered path segments that include this specific peering link, then it is possible to use this peering link during segment combination to create the end-to-end path.</t>
          <section anchor="selection-of-pcbs-to-propagate">
            <name>Selection of PCBs to Propagate</name>
            <t>As an AS receives a series of intra-ISD or core PCBs, it must select the PCBs it will use to continue beaconing. Each AS can independently set policies dictating which PCBs are propagated in which time intervals, and to which neighbors. The selection process can be based on path properties (e.g., length, disjointness across different paths) as well as on PCB properties (e.g., age, remaining lifetime of sent instances) - each AS is free to use those properties that suit the AS best. The control service can then compute the overall quality of each candidate PCB based on these properties. For this, the AS should use a selection algorithm or metric that reflects its needs and requirements and identifies the best PCBs or paths segments for this AS.</t>
            <t>For a detailed description of selecting PCBs to propagate, see the section "Selection of PCBs to Propagate" in <xref target="I-D.dekater-scion-controlplane"/>.</t>
          </section>
          <section anchor="propagating-a-pcb">
            <name>Propagating a PCB</name>
            <t>Every propagation period (as configured by the AS), the control service</t>
            <ul spacing="normal">
              <li>
                <t>selects the best combinations of PCBs and interfaces connecting to a neighboring AS (i.e., a child AS or a core AS), and</t>
              </li>
              <li>
                <t>sends each selected PCB to the selected egress interface(s) associated with it.</t>
              </li>
            </ul>
            <t>For every selected PCB and egress interface combination, the AS extends the PCB by adding a so-called <em>AS entry</em> to the selected PCB. Such an AS entry includes a hop field that specifies the incoming (ingress) and outgoing (egress) interface for the packet forwarding through this AS, in the beaconing direction. The AS entry can also contain peer entries.</t>
            <t>For a detailed description of the propagation of a PCB, see the sections "PCB Propagation - Illustrated Example" and "Propagation of Selected PCBs" in <xref target="I-D.dekater-scion-controlplane"/>.</t>
          </section>
        </section>
        <section anchor="path-registration">
          <name>Path Registration</name>
          <t>Path registration is the process where an AS transforms selected PCBs into path segments, and adds these segments to the relevant path databases, thus making them available to other ASes.</t>
          <t>As mentioned previously, a non-core AS typically receives several PCBs representing several path segments to the core ASes of the ISD the AS belongs to. Out of these PCBs, the non-core AS selects those down-path segments through which it wants to be reached, based on AS-specific selection criteria. The next step is to register the selected down-segments with the control service of the relevant core ASes, according to a process called <em>intra-ISD path-segment registration</em>. As a result, a core AS's control service contains all intra-ISD path segments registered by the non-core ASes of its ISD. In addition, each core AS control service also stores preferred core-path segments to other core ASes, in the <em>core-segment registration</em> process.</t>
          <t>For a detailed description of path-segment registration, see the section "Registration of Path Segments" in <xref target="I-D.dekater-scion-controlplane"/>.</t>
          <section anchor="intra-isd-path-segment-registration">
            <name>Intra-ISD Path-Segment Registration</name>
            <t>Every <em>registration period</em> (determined by each AS), the AS's control service selects two sets of PCBs to transform into two types of path segments:</t>
            <ul spacing="normal">
              <li>
                <t>Up-segments, which allow the infrastructure entities and endpoints in this AS to communicate with core ASes; and</t>
              </li>
              <li>
                <t>down-segments, which allow remote entities to reach this AS.</t>
              </li>
            </ul>
            <t>The up- and down-segments do not have to be equal.  An AS may want to communicate with core ASes via one or more up-segments that differ from the down-segment(s) through which it wants to be reached. Therefore, an AS can define different selection policies for the up- and down-segment sets.</t>
          </section>
          <section anchor="core-path-segment-registration">
            <name>Core Path-Segment Registration</name>
            <t>The core beaconing process creates path segments from core AS to core AS. These core-segments are then added to the control service path database of the core AS that created the segment, so that local and remote endpoints can obtain and use these core-segments. In contrast to the intra-ISD registration procedure, there is no need to register core-segments with other core ASes (as each core AS will receive PCBs originated from every other core AS).</t>
          </section>
        </section>
        <section anchor="path-lookup">
          <name>Path Lookup</name>
          <t>The <em>path lookup</em> is a fundamental building block of SCION's path management, as it enables endpoints to obtain path segments found during path exploration and registered during path registration. This allows the endpoints to construct end-to-end paths from the set of possible path segments returned by the path lookup process. The lookup of paths still happens in the control plane, whereas the construction of the actual end-to-end paths happens in the data plane.</t>
          <section anchor="lookup-process">
            <name> Lookup Process</name>
            <t>An endpoint (source) that wants to start communication with another endpoint (destination), requires up to three path segments:</t>
            <ul spacing="normal">
              <li>
                <t>An up-path segment to reach the core of the source ISD (only if the source endpoint is a non-core AS),</t>
              </li>
              <li>
                <t>a core-path segment to reach  </t>
                <ul spacing="normal">
                  <li>
                    <t>another core AS in the source ISD, in case the destination AS is in the same source ISD, or</t>
                  </li>
                  <li>
                    <t>a core AS in a remote ISD, if the destination AS is in another ISD, and</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>a down-path segment to reach the destination AS.</t>
              </li>
            </ul>
            <t><strong>Note</strong>: The actual number of required path segments depends on the location of the destination AS as well as on the availability of shortcuts and peering links. More information on combining and constructing paths is provided by the <xref target="I-D.dekater-scion-dataplane"/> document.</t>
            <t>The process to look up and fetch path segments consists of the following steps:</t>
            <ol spacing="normal" type="1"><li>
                <t>First, the source endpoint queries the control service in its own AS (i.e., the source AS) for the required segments. The control service has up-path segments stored in its path database. Additionally, the control service checks if it has appropriate core- and down-path segments in store as well; in this case it returns them immediately.</t>
              </li>
              <li>
                <t>If there are no appropriate core-segments and down-segments, the control service in the source AS queries the control services of the reachable core ASes in the source ISD, for core-path segments to core ASes in the destination ISD (which is either the own or a remote ISD). To reach the core control services, the control service of the source AS uses the locally stored up-path segments.</t>
              </li>
              <li>
                <t>Next, the control service of the source AS combines up-path segments with the newly retrieved core-path segments. The control service then queries the control services of the remote core ASes in the destination ISD, to fetch down-path segments to the destination AS. To reach the remote core ASes, the control service of the source AS uses the previously obtained and combined up- and core segments.</t>
              </li>
              <li>
                <t>Finally, the control service of the source AS returns all retrieved path segments to the source endpoint.</t>
              </li>
              <li>
                <t>Once it has obtained all path segments, the endpoint combines them into an end-to-end path in the data plane.</t>
              </li>
            </ol>
          </section>
          <section anchor="caching">
            <name> Caching</name>
            <t>For the sake of efficiency, the control service of the source AS should cache each returned path segment request. Caching ensures that path lookups are fast for frequently used destinations. The use of caching is also essential to ensure that the path-lookup process is scalable and can be performed with low latency. Additionally, it is good practice to send requests in parallel when requesting path segments from other control services.</t>
          </section>
        </section>
      </section>
      <section anchor="scion-data-plane">
        <name>SCION Data Plane</name>
        <t>While the control plane is responsible for providing end-to-end paths, the data plane ensures that packets are forwarded on the selected path. The SCION data plane fundamentally differs from today's IP-based data plane in that it is <em>path-aware</em>: In SCION, inter-domain forwarding directives are embedded in the packet header.</t>
        <t>SCION routers are deployed at the edge of an AS, and peer with neighbor SCION routers. Inter-domain forwarding is based on end-to-end path information contained in the packet header. This path information consists of a sequence of hop fields. Each hop field corresponds to an AS on the path, and it includes an ingress- as well as an egress interface ID, which univocally identify the ingress and egress interfaces within the AS. The information is authenticated with a Message Authentication Code (MAC) to prevent forgery. This concept allows SCION routers to forward packets to a neighbor AS without inspecting the destination address and also without consulting an inter-domain forwarding table; the SCION router can just access the next hop from the packet header.</t>
        <t><em>Intra</em>-domain forwarding and routing are based on existing mechanisms (e.g., IP). A SCION border router reuses existing intra-domain infrastructure to communicate to other SCION routers or SCION endpoints within its AS. The last SCION router at the destination AS therefore uses the destination address to forward the packet to the appropriate local endpoint.</t>
        <t>The SCION design choice has the following advantages:</t>
        <ul spacing="normal">
          <li>
            <t>It provides control and transparency over forwarding paths to endpoints.</t>
          </li>
          <li>
            <t>It simplifies the packet-processing at routers: Instead of having to perform longest-prefix matching on IP addresses, which requires expensive hardware and substantial amounts of energy, a router can simply access the next hop from the packet header, after having verified the authenticity of the hop field's MAC.</t>
          </li>
        </ul>
        <t><strong>Note</strong>: This section describes the SCION data plane on a very high level. A much more detailed description of SCION's data plane is available in <xref target="I-D.dekater-scion-dataplane"/>.</t>
        <section anchor="path-construction-via-segment-combination">
          <name>Path Construction via Segment Combination</name>
          <t>Paths are discovered by the SCION control plane, which makes them available to SCION endpoints in the form of path segments. There are three kinds of path segments: up, down, and core. In the data plane, a SCION endpoint creates end-to-end paths from the path segments, by combining multiple path segments. Depending on the network topology, a SCION forwarding path can consist of one, two, or three segments. Each path segment contains several hop fields representing the ASes on the segment as well as one info field with basic information about the segment, such as a timestamp.</t>
          <t><xref target="combinations"/> below shows the different allowed segment combinations.</t>
          <t><strong>Note</strong>: It is assumed that the source and destination endpoints are in different ASes.</t>
          <figure anchor="combinations">
            <name>Illustration of possible path-segment combinations. Each node represents a SCION Autonomous System.</name>
            <artwork><![CDATA[
                                  ------- = end-to-end path
   C = Core AS                    - - - - = unused links
   * = source/destination AS      ------> = direction of beaconing


          Core                        Core                  Core
      ---------->                 ---------->           ---------->
     .-.       .-.               .-.       .-.         .-.       .-.
+-- ( C )-----( C ) --+     +-- ( C )-----(C/*)       (C/*)-----(C/*)
|    `+'       `+'    |     |    `+'       `-'         `-'       `-'
|     |    1a   |     |     |     |     1b                   1c
|     |         |     |     |     |
|     |         |     |     |     |
|    .+.       .+.    |     |    .+.                       Core
|   (   )     (   )   |     |   (   )                 -------------->
|    `+'       `+'    |     |    `+'                        .-.
|     |         |     |     |     |                   +----( C )----+
|     |         |     |     |     |                   |     `-'     |
|     |         |     |     |     |                   |             |
|    .+.       .+.    |     |    .+.                 .+.     1d    .+.
+-> ( * )     ( * ) <-+     +-> ( * )               (C/*)         (C/*)
     `-'       `-'               `-'                 `-'           `-'



          .-.                      .-.                   .-.
+--   +--( C )--+   --+      +--  (C/*)        +--    - ( C ) -    --+
|     |   `-'   |     |      |     `+'         |     |   `-'   |     |
|     |         |     |      |      |          |                     |
|     |    2a   |     |      |  2b  |          |     |    3a   |     |
|     |         |     |      |      |          |                     |
|    .+.       .+.    |      |     .+.         |    .+.       .+.    |
|   (   )     (   )   |      |    (   )        |   (   #-----#   )   |
|    `+'       `+'    |      |     `+'         |    `+'  Peer `+'    |
|     |         |     |      |      |          |     |         |     |
|     |         |     |      |      |          |     |         |     |
|     |         |     |      |      |          |     |         |     |
|    .+.       .+.    |      |     .+.         |    .+.       .+.    |
+-> ( * )     ( * ) <-+      +->  ( * )        +-> ( * )     ( * ) <-+
     `-'       `-'                 `-'              `-'       `-'


          Core                                    Core
      ---------->                              ---------->
     .-.       .-.             .-.            .-.       .-.        .-.
 +--( C )- - -( C )--+  +---- ( C ) ----+    ( C )- - -( C )  +-- ( C )
 |   `+'       `+'   |  |      `+'      |     `+'       `+'   |    `+'
 |         3b        |  |           4a  |          4b         |  5
 |    |         |    |  |       |       |      |         |    |     |
 |                   |  |               |                     |
 |   .+.       .+.   |  |      .+.      |      + - --. - +    |    .+.
 |  (   #-----#   )  |  |   +-(   )-+   |      +--(   )--+    |   ( * )
 |   `+'  Peer `+'   |  |   |  `-'  |   |      |   `-'   |    |    `+'
 |    |         |    |  |   |       |   |      |         |    |     |
 |    |         |    |  |   |       |   |      |         |    |     |
 |    |         |    |  |   |       |   |      |         |    |     |
 |   .+.       .+.   |  |  .+.     .+.  |     .+.       .+.   |    .+.
 +->( * )     ( * )<-+  +>( * )   ( * )<+    ( * )     ( * )  +-> ( * )
     `-'       `-'         `-'     `-'        `-'       `-'        `-'
]]></artwork>
          </figure>
          <t>The following path-segment combinations are allowed:</t>
          <ul spacing="normal">
            <li>
              <t><em>Communication through core ASes</em>:  </t>
              <ul spacing="normal">
                <li>
                  <t><em>Core-segment combination</em> (Cases 1a, 1b, 1c, 1d in <xref target="combinations"/>): The up- and down-segments of source and destination do not have an AS in common. In this case, a core-segment is required to connect the source's up- and the destination's down-segment (Case 1a). If either the source or the destination AS is a core AS (Case 1b) or both are core ASes (Cases 1c and 1d), then no up- or down-segment(s) are required to connect the respective AS(es) to the core-segment.</t>
                </li>
                <li>
                  <t><em>Immediate combination</em> (Cases 2a, 2b in <xref target="combinations"/>): The last AS on the up-segment (which is necessarily a core AS) is the same as the first AS on the down-segment. In this case, a simple combination of up- and down-segments creates a valid forwarding path. In Case 2b, only one segment is required.</t>
                </li>
              </ul>
            </li>
            <li>
              <t><em>Peering shortcut</em> (Cases 3a and 3b): A peering link exists between the up- and down-segment. The extraneous path segments to the core are cut off. Note that the up- and down-segments do not need to originate from the same core AS and the peering link could also be traversing to a different ISD.</t>
            </li>
            <li>
              <t><em>AS shortcut</em> (Cases 4a and 4b): The up- and down-segments intersect at a non-core AS below the ISD core, thus creating a shortcut. In this case, a shorter path is made possible by removing the extraneous part of the path to the core. Note that the up- and down-segments do not need to originate from the same core AS and can even be in different ISDs (if the AS at the intersection is part of multiple ISDs).</t>
            </li>
            <li>
              <t><em>On-path</em> (Case 5): In the case where the source's up-segment contains the destination AS or the destination's down-segment contains the source AS, a single segment is sufficient to construct a forwarding path. Again, no core AS is on the final path.</t>
            </li>
          </ul>
          <t>Once a forwarding path is chosen, it is encoded in the SCION packet header, making inter-domain routing tables unnecessary for the SCION routers. The destination can respond to the source by reversing the end-to-end path from the packet header, or it can perform its own path lookup and combination.</t>
        </section>
        <section anchor="scion-header-specification">
          <name>SCION Header Specification</name>
          <t>As mentioned above, when a source endpoint wants to communicate with a destination endpoint in SCION, it encodes the end-to-end path made up out of path segments in the SCION packet header. This section introduces the SCION header structure and specification. A much more detailed description of the SCION header is provided in the section "SCION Header Specification" of the SCION Data Plane draft <xref target="I-D.dekater-scion-dataplane"/>.</t>
          <section anchor="scion-packet-header">
            <name>SCION Packet Header</name>
            <t>The SCION packet header is composed of a common header, an address header, a path header, and an optional extension header:</t>
            <figure anchor="header">
              <name>High-level SCION header structure</name>
              <artwork><![CDATA[
+--------------------------------------------------------+
|                     Common header                      |
|                                                        |
+--------------------------------------------------------+
|                     Address header                     |
|                                                        |
+--------------------------------------------------------+
|                      Path header                       |
|                                                        |
+--------------------------------------------------------+
|              Extension header (optional)               |
|                                                        |
+--------------------------------------------------------+
]]></artwork>
            </figure>
            <ul spacing="normal">
              <li>
                <t>The <strong>common header</strong> contains important meta information like a version number and the lengths of the header and payload. In particular, it contains flags that control the format of subsequent headers such as the address and path headers.</t>
              </li>
              <li>
                <t>The <strong>address header</strong> contains the ISD-, AS-, and endpoint-addresses of source and destination.</t>
              </li>
              <li>
                <t>The <strong>path header</strong> contains the full AS-level forwarding path of the packet. The <tt>PathType</tt> field in the common header specifies the path format used in the path header.</t>
              </li>
              <li>
                <t>Finally, the optional <strong>extension header</strong> contains a variable number of hop-by-hop and end-to-end options, similar to the extensions in the IPv6 header <xref target="RFC8200"/>.</t>
              </li>
            </ul>
            <t>This document continues with a high-level description of the SCION path header. For a detailed description of the SCION path header, and of the other SCION headers (common-, address-, and extension header), see the SCION Data Plane draft <xref target="I-D.dekater-scion-dataplane"/>.</t>
          </section>
          <section anchor="path-header">
            <name>Path Header</name>
            <t>The <tt>SCION</tt> path type is the standard SCION path type. The path header for the <tt>SCION</tt> path type consists of a path meta header, up to 3 info fields and up to 64 hop fields. It has the following layout:</t>
            <figure anchor="scion-path-header">
              <name>Layout of a standard SCION path header</name>
              <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                          PathMetaHdr                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           InfoField                           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                              ...                              |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           InfoField                           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           HopField                            |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                           HopField                            |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                              ...                              |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
            </figure>
            <ul spacing="normal">
              <li>
                <t>The Path Meta Header (<tt>PathMetaHdr</tt>) indicates the currently valid info field and hop field while the packet is traversing the network along the path, as well as the number of hop fields per path segment.</t>
              </li>
              <li>
                <t>The number of info fields (<tt>InfoField</tt>) equals the number of path segments that the path contains - there is one info field per path segment. Each info field contains basic information about the corresponding segment, such as a timestamp indicating the creation time. There are also two flags. One specifies whether the path segment must be traversed in construction (beaconing) direction, the other whether the first or last hop field in the path segment represents a peering hop field.</t>
              </li>
              <li>
                <t>Each hop field (<tt>HopField</tt>) represents a hop through an AS on the path, with the ingress and egress interface identifiers for this AS. This information is authenticated with a Message Authentication Code (MAC) to prevent forgery.</t>
              </li>
            </ul>
            <t>The SCION path header is created by extracting the required info fields and hop fields from the corresponding path segments, which were looked up by the source endpoint in the control plane.</t>
            <t>A detailed description of the path header and its creation is provided in the section "Path Header" of the SCION Data Plane draft <xref target="I-D.dekater-scion-dataplane"/>.</t>
          </section>
        </section>
        <section anchor="path-authorization">
          <name>Path Authorization</name>
          <t>It is crucial for the data plane that endpoints only use paths constructed and authorized by ASes in the control plane. In particular, endpoints should not be able to craft hop fields themselves, modify hop fields in authorized path segments, or combine hop fields of different path segments (path splicing). The property that prevents this is called <strong>path authorization</strong> (see <xref target="KLENZE2021"/> and <xref target="LEGNER2020"/>).</t>
          <t>SCION uses cryptographic mechanisms to efficiently provide path authorization. The mechanisms are based on <em>symmetric</em> cryptography in the form of message-authentication codes (MACs) in the data plane to secure forwarding information encoded in hop fields. Each AS calculates these MACs using a local secret key (that is only shared between SCION infrastructure elements within the AS) and chains them to the previous hop fields on the path. The MACs are then included in the forwarding path as part of the respective hop fields.</t>
          <t>Detailed information on path authorization in the SCION data plane is provided in the section "Path Authorization" of the SCION Data Plane draft <xref target="I-D.dekater-scion-dataplane"/>.</t>
        </section>
        <section anchor="intra-as-communication">
          <name>Intra-AS Communication</name>
          <t>As SCION is an <em>inter</em>-domain network architecture, it is not concerned with <em>intra</em>-domain forwarding. This corresponds to the general practice today where BGP and IP are used for inter-domain routing and forwarding, respectively, but ASes use an intra-domain protocol of their choice, for example OSPF or IS-IS for routing and IP, MPLS, and various layer-2 protocols for forwarding.</t>
          <t>SCION emphasizes this separation, as SCION is used exclusively for inter-domain forwarding, and re-uses the intra-domain network fabric to provide connectivity among all SCION infrastructure services, border routers, and endpoints. As a consequence, minimal change to the infrastructure is required for ISPs when deploying SCION.</t>
          <t>Although a complete SCION address is composed of the &lt;ISD, AS, endpoint address&gt; 3-tuple, the endpoint address is not used for inter-domain routing or forwarding. This implies that the endpoint addresses are not required to be globally unique or globally routable, they can be selected independently by the corresponding ASes. This means, for example, that an endpoint identified by a link-local IPv6 address in the source AS can directly communicate with an endpoint identified by a globally routable IPv4 address via SCION. Alternatively, it is possible for two SCION hosts with the   same IPv4 address 10.0.0.42 but located in different ASes to communicate with each other via SCION (<xref target="RFC1918"/>).</t>
        </section>
      </section>
    </section>
    <section anchor="deployment">
      <name>Deployment</name>
      <t>Adoption of a next-generation architecture is a challenging task, as it needs to be integrated with, and operate alongside existing infrastructure. SCION is designed to coexist with existing intra-domain routing infrastructure, and comprises coexistence and transition mechanisms that facilitate adoption, in accordance to principles defined in <xref target="RFC8170"/>.
The following section discusses practical considerations for deploying SCION and briefly touches on some of the transition mechanisms, with focus on:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="deployment-as">Autonomous Systems</xref>,</t>
        </li>
        <li>
          <t><xref target="deployment-ixp">Internet Exchange Points</xref>, and</t>
        </li>
        <li>
          <t><xref target="deployment-end-host">endpoints</xref>, covering both native SCION hosts and SCION to IP encapsulation.</t>
        </li>
      </ul>
      <t>We then describe some of the early adopters deployment experiences. A more detailed adoption plan is to be outlined in dedicated documents.</t>
      <section anchor="deployment-as">
        <name>Autonomous System Deployment</name>
        <t>A SCION AS needs to deploy the SCION <xref target="infra-components">infrastructure components</xref> and border routers.
Within an AS, SCION runs over the existing network so makes use of existing intra-domain network and equipment (e.g. IP, MPLS). Customer-side SCION border routers directly connect to the provider-side border routers using last-mile connections. The SCION design assumes that the internal entities of an AS are considered to be trustworthy, so will not compromise or degrade any security properties SCION delivers. When it comes to inter-domain communication, an overlay deployment on top of today’s Internet is not desirable as SCION would inherit issues from its weak underlay. Thus, inter-AS SCION links are usually deployed in parallel to existing links, in order to preserve its security properties. That is, two SCION border routers from neighbour ASes are directly connected via a layer-2 cross-connection at a common point-of-presence.</t>
        <t>All SCION AS components can be deployed on standard x86 commercial off-the-shelf servers or virtual machines. In fact, SCION border routers do not rely on forwarding tables, therefore they do not require specialized hardware. Practice shows that off-the-shelf hardware can handle up to 100 Gbps links, while a prototype <xref target="DERUITER2021">P4 implementation</xref> showed that it is possible to forward SCION traffic even at terabit speeds.</t>
        <t>Overall, an AS can be connected to SCION without high-impact changes to its network. In addition, use of commodity hardware for both control and data-plane components reduces initial deployment costs.</t>
      </section>
      <section anchor="deployment-ixp">
        <name>Internet Exchange Points</name>
        <t>Internet Exchange Points (IXP) play as important a role for SCION as they do in today's Internet.  SCION can be deployed at existing IXPs following a "big switch" model, where the IXP provides a large L2 switch between multiple SCION ASes. SCION has been deployed following this model at the Swiss Internet Exchange (SwissIX),  currently interconnecting major SCION Swiss ISPs and enterprises through bi-lateral peering over dedicated SCION ports.</t>
        <t>Additionally, thanks to its path-awareness, SCION offers the option of an enhanced deployment model, i.e., to expose the internal topology of an IXP within the SCION control plane. This enables IXP customers to use SCION’s multipath and fast failover capabilities to leverage the IXP’s internal links (including backup links) and to select paths depending on the application’s needs.  IXPs have therefore an incentive to expose their rich internal connectivity, as the benefits from SCION’s multipath capabilities would increase their value for customers and provide them with a competitive advantage.</t>
      </section>
      <section anchor="deployment-end-host">
        <name>Endpoints and Incremental Deployability</name>
        <t>End users can leverage SCION in two different ways: (1) using SCION-aware applications on a <xref target="native-endhost">SCION native endpoint</xref>, or (2) using transparent <xref target="sig">IP-to-SCION conversion</xref>. The benefit of using SCION natively is that the full range of advantages becomes available to applications, at the cost of installing the SCION endpoint stack and making the application SCION-aware. In early deployments, the second approach is often preferred, so that no changes are needed within applications or endpoints.</t>
        <section anchor="native-endhost">
          <name>Native Endpoints</name>
          <t>A SCION native endpoint's stack consists of a dispatcher, which handles all incoming and outgoing SCION packets, and of a SCION daemon, which handles control-plane messages. The latter  fetches paths to remote ASes and provides an API for applications and libraries to interact with the SCION control plane (i.e., for path lookup, SCION extensions). The current SCION implementation uses an UDP/IP underlay for communication between endpoints and SCION routers. This allows reuse of existing intra-domain networking infrastructure. SCION endpoints can optionally use automated bootstrapping mechanisms to retrieve configuration from the network and establish SCION connectivity. This way, clients require no pre-existing network-specific configurations.</t>
        </section>
        <section anchor="sig">
          <name>SCION to IP Gateway (SIG)</name>
          <t>A SCION-IP-Gateway (SIG) encapsulates regular IP packets into SCION packets with a corresponding SIG at the destination that performs the decapsulation.
A SIG can be deployed close to the end user (i.e., at branches of an enterprise, on a CPE), or within an ISP's network. In the latter case, the SIG is called carrier-grade SIG, as it serves multiple customers within the AS where it is deployed. This approach has the advantage that it does not require any changes at the customer's premises.
In order to allow incremental deployability and to ease transition from legacy IP-based Internet to SCION, SIGs can be augmented with  mechanisms allowing them to coordinate and automatically exchange IP prefix information. A more detailed description of the SIG and its coordination mechanisms is to be presented in dedicated documents.</t>
        </section>
      </section>
      <section anchor="deploy">
        <name>Deployment Experiences</name>
        <t>SCION has been deployed in production by multiple entities, growing its acceptance among industry. While early deployments started on academic and research networks, SCION has expanded to serve the financial industry, government, and it is being evaluated for the healthcare sector.</t>
        <t>In 2017, SCION was evaluated for production use by a central bank, with the goal of modernising the network interconnecting banks and their branches. SCION was chosen, as it allows moving away from a dedicated private network to a reliable Internet-based solution. SCION connectivity was later extended to support system-critical applications, like the national real-time gross settlement (RTGS) system, connecting all country's banks to exchange real-time payment information.
The network, called Secure Swiss Finance Network or <eref target="https://perma.cc/PU5L-ALPM">SSFN</eref>, is implemented as a SCION ISD, where a federation of three ISPs forms the ISD core.
Financial institutions are themselves SCION ASes and directly connect to one or more of the core ASes. Institutions deploy SCION–IP gateways (SIGs), transparently enabling their traditional IP-based applications to use the SCION network.
The concept of the SCION ISD also provides a mechanism to implement strict governance and access control (through the issuance of AS certificates).</t>
        <t>Besides the SSFN, SCION connectivity has also been adopted by government entities for their international communications. In addition, Swiss higher education institutions are connected thanks to the <eref target="http://scied.scion-architecture.net/">SCI-ED</eref> network.</t>
        <t>In addition to productive deployments, SCION also comprises a global SCION research testbed called <eref target="https://www.scionlab.org">SCIONLab</eref>. It is composed of dozens of globally distributed infrastructure ASes, mostly run by academic institutions. The testbed is open to any user who can easily set up their own AS with the aid of a web-based UI, connect to the network, and run experiments. The setup has been the earliest global deployment of SCION and it has been supporting research and development of path-aware networking and SCION.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>The ISD and SCION AS number are SCION-specific numbers. They are currently allocated by Anapaya Systems, a provider of SCION-based networking software and solutions (see Anapaya ISD AS assignments https://docs.anapaya.net/en/latest/resources/isd-as-assignments/). This task is currently being transitioned from Anapaya to the SCION Association.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The goal of SCION is to provide a secure inter-domain network architecture by default. This document provides an overview of core components, but the security implications and considerations are discussed in the Internet Drafts relating to each specific component (see <xref target="I-D.dekater-scion-pki"/>, <xref target="I-D.dekater-scion-controlplane"/>, and <xref target="I-D.dekater-scion-dataplane"/>).</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC4264">
          <front>
            <title>BGP Wedgies</title>
            <author fullname="T. Griffin" initials="T." surname="Griffin"/>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <date month="November" year="2005"/>
            <abstract>
              <t>It has commonly been assumed that the Border Gateway Protocol (BGP) is a tool for distributing reachability information in a manner that creates forwarding paths in a deterministic manner. In this memo we will describe a class of BGP configurations for which there is more than one potential outcome, and where forwarding states other than the intended state are equally stable. Also, the stable state where BGP converges may be selected by BGP in a non-deterministic manner. These stable, but unintended, BGP states are termed here "BGP Wedgies". This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4264"/>
          <seriesInfo name="DOI" value="10.17487/RFC4264"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8205">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9049">
          <front>
            <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
            <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
              <t>This document contains that catalog and analysis.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9049"/>
          <seriesInfo name="DOI" value="10.17487/RFC9049"/>
        </reference>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol. Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult. This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="SCHUCHARD2011">
          <front>
            <title>Losing control of the internet: using the data plane to attack the control plane</title>
            <author fullname="Max Schuchard" initials="M." surname="Schuchard">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Abedelaziz Mohaisen" initials="A." surname="Mohaisen">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Denis Foo Kune" initials="D." surname="Foo Kune">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Nicholas Hopper" initials="N." surname="Hopper">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Yongdae Kim" initials="Y." surname="Kim">
              <organization>University of Minnesota, Minneapolis, MN, USA</organization>
            </author>
            <author fullname="Eugene Y. Vasserman" initials="E." surname="Vasserman">
              <organization>Kansas State University, Manhaattan, KS, USA</organization>
            </author>
            <date month="October" year="2010"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM conference on Computer and communications" value="security"/>
          <seriesInfo name="DOI" value="10.1145/1866307.1866411"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="LABOVITZ2000">
          <front>
            <title>Delayed Internet routing convergence</title>
            <author fullname="Craig Labovitz" initials="C." surname="Labovitz">
              <organization>Microsoft Research, One Microsoft Way, Redmond, WA</organization>
            </author>
            <author fullname="Abha Ahuja" initials="A." surname="Ahuja">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Abhijit Bose" initials="A." surname="Bose">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <author fullname="Farnam Jahanian" initials="F." surname="Jahanian">
              <organization>University of Michigan, Department of Electrical Engineering and Computer Science, 1301 Beal Avenue, Ann Arbor, MI</organization>
            </author>
            <date month="August" year="2000"/>
          </front>
          <seriesInfo name="Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer" value="Communication"/>
          <seriesInfo name="DOI" value="10.1145/347059.347428"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="GRIFFIN1999">
          <front>
            <title>An analysis of BGP convergence properties</title>
            <author fullname="Timothy G. Griffin" initials="T." surname="Griffin">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <author fullname="Gordon Wilfong" initials="G." surname="Wilfong">
              <organization>Bell Laboratories, Lucent Technologies, 600 Mountain Avenue, Murray Hill, NJ</organization>
            </author>
            <date month="August" year="1999"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 29, no. 4, pp. 277-288"/>
          <seriesInfo name="DOI" value="10.1145/316194.316231"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SAHOO2009">
          <front>
            <title>BGP convergence delay after multiple simultaneous router failures: Characterization and solutions</title>
            <author fullname="Amit Sahoo" initials="A." surname="Sahoo">
              <organization/>
            </author>
            <author fullname="Krishna Kant" initials="K." surname="Kant">
              <organization/>
            </author>
            <author fullname="Prasant Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <date month="May" year="2009"/>
          </front>
          <seriesInfo name="Computer Communications" value="vol. 32, no. 7-10, pp. 1207-1218"/>
          <seriesInfo name="DOI" value="10.1016/j.comcom.2009.03.009"/>
          <refcontent>Elsevier BV</refcontent>
        </reference>
        <reference anchor="LYCHEV2013">
          <front>
            <title>BGP security in partial deployment: is the juice worth the squeeze?</title>
            <author fullname="Robert Lychev" initials="R." surname="Lychev">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA, USA</organization>
            </author>
            <author fullname="Michael Schapira" initials="M." surname="Schapira">
              <organization>Hebrew University of Jerusalem, Jerusalem, Israel</organization>
            </author>
            <date month="August" year="2013"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 43, no. 4, pp. 171-182"/>
          <seriesInfo name="DOI" value="10.1145/2534169.2486010"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="LI2014">
          <front>
            <title>Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec?</title>
            <author fullname="Qi Li" initials="Q." surname="Li">
              <organization/>
            </author>
            <author fullname="Yi-Chun Hu" initials="Y." surname="Hu">
              <organization/>
            </author>
            <author fullname="Xinwen Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <seriesInfo name="Proceedings 2014 Workshop on Security of Emerging Networking" value="Technologies"/>
          <seriesInfo name="DOI" value="10.14722/sent.2014.23001"/>
          <refcontent>Internet Society</refcontent>
        </reference>
        <reference anchor="COOPER2013">
          <front>
            <title>On the risk of misbehaving RPKI authorities</title>
            <author fullname="Danny Cooper" initials="D." surname="Cooper">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Ethan Heilman" initials="E." surname="Heilman">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Kyle Brogle" initials="K." surname="Brogle">
              <organization>Stanford University, Stanford, CA</organization>
            </author>
            <author fullname="Leonid Reyzin" initials="L." surname="Reyzin">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
              <organization>Boston University, Boston, MA</organization>
            </author>
            <date month="November" year="2013"/>
          </front>
          <seriesInfo name="Proceedings of the Twelfth ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/2535771.2535787"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="ROTHENBERGER2017">
          <front>
            <title>Internet Kill Switches Demystified</title>
            <author fullname="Benjamin Rothenberger" initials="B." surname="Rothenberger">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Daniele E. Asoni" initials="D." surname="Asoni">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="David Barrera" initials="D." surname="Barrera">
              <organization>ETH Zürich</organization>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <date month="April" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 10th European Workshop on Systems" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3065913.3065922"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="MORILLO2021">
          <front>
            <title>ROV++: Improved Deployable Defense against BGP Hijacking</title>
            <author fullname="Reynaldo Morillo" initials="R." surname="Morillo">
              <organization/>
            </author>
            <author fullname="Justin Furuness" initials="J." surname="Furuness">
              <organization/>
            </author>
            <author fullname="Cameron Morris" initials="C." surname="Morris">
              <organization/>
            </author>
            <author fullname="James Breslin" initials="J." surname="Breslin">
              <organization/>
            </author>
            <author fullname="Amir Herzberg" initials="A." surname="Herzberg">
              <organization/>
            </author>
            <author fullname="Bing Wang" initials="B." surname="Wang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <seriesInfo name="Proceedings 2021 Network and Distributed System Security" value="Symposium"/>
          <seriesInfo name="DOI" value="10.14722/ndss.2021.24438"/>
          <refcontent>Internet Society</refcontent>
        </reference>
        <reference anchor="KLENZE2021">
          <front>
            <title>Formal Verification of Secure Forwarding Protocols</title>
            <author fullname="Tobias Klenze" initials="T." surname="Klenze">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="Christoph Sprenger" initials="C." surname="Sprenger">
              <organization>ETH Zurich</organization>
            </author>
            <author fullname="David Basin" initials="D." surname="Basin">
              <organization>ETH Zurich</organization>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 IEEE 34th Computer Security Foundations Symposium" value="(CSF)"/>
          <seriesInfo name="DOI" value="10.1109/csf51468.2021.00018"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="DERUITER2021">
          <front>
            <title>Next-generation internet at terabit speed: SCION in P4</title>
            <author fullname="Joeri de Ruiter" initials="J." surname="de Ruiter">
              <organization>SURF, Utrecht, The Netherlands</organization>
            </author>
            <author fullname="Caspar Schutijser" initials="C." surname="Schutijser">
              <organization>SIDN Labs, Arnhem, The Netherlands</organization>
            </author>
            <date month="December" year="2021"/>
          </front>
          <seriesInfo name="Proceedings of the 17th International Conference on emerging Networking EXperiments and" value="Technologies"/>
          <seriesInfo name="DOI" value="10.1145/3485983.3494839"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="ANDERSEN2001">
          <front>
            <title>Resilient overlay networks</title>
            <author fullname="David Andersen" initials="D." surname="Andersen">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Hari Balakrishnan" initials="H." surname="Balakrishnan">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Frans Kaashoek" initials="F." surname="Kaashoek">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <author fullname="Robert Morris" initials="R." surname="Morris">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="October" year="2001"/>
          </front>
          <seriesInfo name="Proceedings of the eighteenth ACM symposium on Operating systems" value="principles"/>
          <seriesInfo name="DOI" value="10.1145/502034.502048"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="KATZ2012">
          <front>
            <title>LIFEGUARD: practical repair of persistent route failures</title>
            <author fullname="Ethan Katz-Bassett" initials="E." surname="Katz-Bassett">
              <organization>University of Washington &amp;amp; University of Southern California, Seattle, WA, USA</organization>
            </author>
            <author fullname="Colin Scott" initials="C." surname="Scott">
              <organization>University of California, Berkeley, Berkeley, CA, USA</organization>
            </author>
            <author fullname="David R. Choffnes" initials="D." surname="Choffnes">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Ítalo Cunha" initials="Í." surname="Cunha">
              <organization>Universidade Federal de Minas Gerais, Belo Horizonte, MG, Brazil</organization>
            </author>
            <author fullname="Vytautas Valancius" initials="V." surname="Valancius">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Nick Feamster" initials="N." surname="Feamster">
              <organization>Georgia Tech, Atlanta, GA, USA</organization>
            </author>
            <author fullname="Harsha V. Madhyastha" initials="H." surname="Madhyastha">
              <organization>University of California, Riverside, Riverside, CA, USA</organization>
            </author>
            <author fullname="Thomas Anderson" initials="T." surname="Anderson">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <author fullname="Arvind Krishnamurthy" initials="A." surname="Krishnamurthy">
              <organization>University of Washington, Seattle, WA, USA</organization>
            </author>
            <date month="August" year="2012"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 42, no. 4, pp. 395-406"/>
          <seriesInfo name="DOI" value="10.1145/2377677.2377756"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="KUSHMAN2007">
          <front>
            <title>Can you hear me now?!: it must be BGP</title>
            <author fullname="Nate Kushman" initials="N." surname="Kushman">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Srikanth Kandula" initials="S." surname="Kandula">
              <organization>MIT CSAIL</organization>
            </author>
            <author fullname="Dina Katabi" initials="D." surname="Katabi">
              <organization>MIT CSAIL</organization>
            </author>
            <date month="March" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 37, no. 2, pp. 75-84"/>
          <seriesInfo name="DOI" value="10.1145/1232919.1232927"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="PERRIG2017" target="https://doi.org/10.1007/978-3-319-67080-5">
          <front>
            <title>SCION: A Secure Internet Architecture</title>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="P." surname="Szalachowski" fullname="Pawel Szalachowski">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="R." surname="Reischuk" fullname="Raphael Reischuk">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2017"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-319-67079-9"/>
        </reference>
        <reference anchor="KING2022" target="https://datatracker.ietf.org/doc/draft-king-irtf-challenges-in-routing/">
          <front>
            <title>Challenges for the Internet Routing Systems Introduced by Semantic Routing</title>
            <author initials="D." surname="King" fullname="Daniel King">
              <organization>Lancaster University</organization>
            </author>
            <author initials="A." surname="Farrel" fullname="Adrian Farrel">
              <organization>Old Dog consulting</organization>
            </author>
            <author initials="C." surname="Jacquenet" fullname="Christian Jacquenet">
              <organization>Orange</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="HITZ2021" target="https://perma.cc/4H3Q-WZNG">
          <front>
            <title>Demonstrating the reliability and resilience of Secure Swiss Finance Network</title>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://www.usenix.org/conference/usenixsecurity20/presentation/legner">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="CHUAT22" target="https://doi.org/10.1007/978-3-031-05288-0">
          <front>
            <title>The Complete Guide to SCION</title>
            <author initials="L." surname="Chuat" fullname="Laurent Chuat">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="D." surname="Hausheer" fullname="David Hausheer">
              <organization>Otto von Guericke University Magdeburg</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <author initials="P." surname="Mueller" fullname="Peter Mueller">
              <organization>ETH Zuerich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zuerich</organization>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISBN" value="978-3-031-05287-3"/>
        </reference>
        <reference anchor="I-D.rustignoli-scion-components" target="https://datatracker.ietf.org/doc/draft-rustignoli-panrg-scion-components/">
          <front>
            <title>SCION Components Analysis</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.dekater-scion-pki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
          <front>
            <title>SCION Control-Plane PKI</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.dekater-scion-controlplane" target="https://datatracker.ietf.org/doc/draft-dekater-scion-controlplane/">
          <front>
            <title>SCION Control Plane</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="M." surname="Frei" fullname="Matthias Frei">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.dekater-scion-dataplane" target="https://datatracker.ietf.org/doc/draft-dekater-scion-dataplane/">
          <front>
            <title>SCION Data Plane</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 935?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks go to Cyrill Krähenbühl, Juan A. Garcia-Pardo, and Kevin Meynell for reviewing this document. We are also indebted to Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, and Peter Müller, for writing the book "The Complete Guide to SCION" (see <xref target="CHUAT22"/>), which provides the background information needed to write this informational draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
