<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-6man-vpn-dest-opt-05" category="exp" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Svc. Dest. Opt.">The IPv6 VPN Service Destination Option</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-6man-vpn-dest-opt-05"/>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Herndon</city>
          <region>Virginia</region>
          <country>USA</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author initials="X." surname="Li" fullname="Xing Li">
      <organization>CERNET Center/Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xing@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author initials="Y." surname="Kamite" fullname="Yuji Kamite">
      <organization>NTT Communications Corporation</organization>
      <address>
        <postal>
          <city>3-4-1 Shibaura</city>
          <region>Minato-ku</region>
          <country>Japan</country>
        </postal>
        <email>y.kamite@ntt.com</email>
      </address>
    </author>
    <author initials="L." surname="Jalil" fullname="Luay Jalil">
      <organization>Verizon</organization>
      <address>
        <postal>
          <city>Richardson</city>
          <region>Texas</region>
          <country>USA</country>
        </postal>
        <email>luay.jalil@one.verizon.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="05"/>
    <area>Internet</area>
    <workgroup>6man</workgroup>
    <keyword>IPv6, Destination Option, VPN</keyword>
    <abstract>
      <?line 91?>

<t>This document describes an experiment in which VPN service information for both layer 2 and layer 3 VPNs is encoded in a new IPv6 Destination Option. The new IPv6 Destination Option is called the VPN Service Option.</t>
      <t>One purpose of this experiment is to demonstrate that the VPN Service Option can be implemented and deployed in a production network.  Another purpose is to demonstrate that the security considerations, described in this document, are sufficient to protect use of the VPN Service Option.  Finally, this document encourages replication of the experiment.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Generic Packet Tunneling <xref target="RFC2473"/> allows a router in one network to encapsulate a packet in an IP header and send that packet across the Internet to another router, creating a virtual link. The receiving router removes the outer IP header and forwards the original packet into its own network. One motivation for Generic Packet Tunneling is to provide connectivity between two networks that share a private addressing <xref target="RFC1918"/> <xref target="RFC4193"/> plan but are not connected by direct links.
In this case, all sites in the first network are accessible to all sites in the second network. Likewise, all sites in the second network are accessible to all sites in the first network.</t>
      <t>Virtual Private Networks (VPN) technologies provide additional functionality, allowing network providers to emulate private networks by using shared infrastructure.  For example, assume that red sites and blue sites connect to a provider network. The provider network allows communication among red sites. It also allows communication among blue sites.  However, it prevents communication between red sites and blue sites.</t>
      <t>The IETF has standardized many VPN technologies, including:</t>
      <ul spacing="normal">
        <li>
          <t>Layer 2 VPN (L2VPN) <xref target="RFC6624"/>.</t>
        </li>
        <li>
          <t>Layer 3 VPN (L3VPN) <xref target="RFC4364"/>.</t>
        </li>
        <li>
          <t>Virtual Private LAN Service (VPLS) <xref target="RFC4761"/><xref target="RFC4762"/>.</t>
        </li>
        <li>
          <t>Ethernet VPN (EVPN) <xref target="RFC7432"/>.</t>
        </li>
        <li>
          <t>Pseudowires <xref target="RFC8077"/>.</t>
        </li>
      </ul>
      <t>The VPN technologies mentioned above share the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>An ingress Provider Edge (PE) device tunnels customer data to an egress PE device. A popular tunnel technology for all of these VPN approaches is MPLS where the tunnel header includes an MPLS <xref target="RFC3032"/> service label. The service label identifies a Forwarding Information Base (FIB) entry on the egress PE.</t>
        </li>
        <li>
          <t>The egress PE removes the tunnel header, exposing the customer data. It then searches its FIB for an entry that matches the incoming service label. If the egress PE finds this entry, it forwards the customer data to a Customer Edge (CE) device. If it does not find this entry, it discards the packet.</t>
        </li>
      </ul>
      <t>The mechanism described above requires both PE devices (ingress and egress) to support MPLS. It cannot be deployed where one or both of the PEs does not support MPLS.</t>
      <t>This document describes an experiment in which VPN service information for both layer 2 and layer 3 VPNs is encoded in a new IPv6 Destination Option <xref target="RFC8200"/> called the VPN Service Option. This option will allow VPNs to be deployed between Provider Edge routers that support IPv6 but do not support MPLS.</t>
      <t>One purpose of this experiment is to demonstrate that the VPN Service Option can be implemented and deployed in a production network. Another purpose is to demonstrate that the security considerations, described in this document, are sufficient to protect use of the VPN Service Option. Experimenters should report any security flaws that they discover. Finally, this document encourages replication of the experiment, so that operational issues can be discovered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="option">
      <name>The VPN Service Option</name>
      <t>The VPN Service Option is an IPv6 Destination Option encoded following the encoding rules defined in <xref target="RFC8200"/>.</t>
      <t>As shown in section 4.2 of <xref target="RFC8200"/> the IPv6 Destination Option contains three fields: Option Type, Opt Data Len, Option Data. For the VPN Service Option the fields are used as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Option Type: 8-bit selector.  VPN Service Option. This field <bcp14>MUST</bcp14> be set to RFC3692-style Experiment (0x5E)<xref target="V6MSG"/>.  See Note below.</t>
        </li>
        <li>
          <t>Opt Data Len - 8-bit unsigned integer.  Length of the option, in
 octets, excluding the Option Type and Option Length fields.  This
 field <bcp14>MUST</bcp14> be set to 4.</t>
        </li>
        <li>
          <t>Option Data - 32 bits.  VPN Service Information:
          </t>
          <ul spacing="normal">
            <li>
              <t>High-order 12 bits: Reserved. <bcp14>SHOULD</bcp14> be set to 0 by the sender and <bcp14>MUST</bcp14> be ignored by the receiver.</t>
            </li>
            <li>
              <t>Low-order 20 bits: Identifies a FIB entry on the egress PE. The FIB entry determines how the egress PE will forward customer data to a CE device.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>The VPN Service Option <bcp14>MAY</bcp14> appear in a Destination Options header
that precedes an upper-layer header.  It <bcp14>MUST NOT</bcp14> appear in any other
extension header.  If a receiver finds the VPN Service option in another
extension header that it is processing, the option will be unrecognized,
and the packet <bcp14>MUST</bcp14> be processed according to the setting of the two highest 
order bits of the Option Type (see NOTE below).</t>
      <t>NOTE: For this experiment, the Option Type is set to '01011110', i.e.,
0x5E. The highest-order two bits are set to 01 to indicate that the
required action by a destination node that does not recognize the option
is to discard the packet. The third highest-order bit is set to 0 to
indicate that Option Data cannot be modified along the path between
the packet's source and its destination. The remaining low-order bits
are set to '11110' to indicate the single IPv6 Destination Option Type
code point available in the registry for experimentation.</t>
    </section>
    <section anchor="forwarding-plane-considerations">
      <name>Forwarding Plane Considerations</name>
      <t>The ingress PE encapsulates the customer payload in a tunnel header. The tunnel header contains:</t>
      <ul spacing="normal">
        <li>
          <t>An IPv6 header</t>
        </li>
        <li>
          <t>An optional IPv6 Authentication Header (AH) <xref target="RFC4302"/></t>
        </li>
        <li>
          <t>An IPv6 Destination Options Extension Header</t>
        </li>
      </ul>
      <t>The IPv6 header contains:</t>
      <ul spacing="normal">
        <li>
          <t>Version - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> be equal to 6.</t>
        </li>
        <li>
          <t>Traffic Class - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Flow Label - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Payload Length - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Next Header - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> be equal to either Authentication Header (51) or Destination Options (60).</t>
        </li>
        <li>
          <t>Hop Limit - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Source Address - Defined in <xref target="RFC8200"/>. Represents an interface on the ingress PE device.</t>
        </li>
        <li>
          <t>Destination Address - Defined in <xref target="RFC8200"/>. Represents an interface on the egress PE device.</t>
        </li>
      </ul>
      <t>If the Authentication Header is present, it contains:</t>
      <ul spacing="normal">
        <li>
          <t>Next Header - Defined in <xref target="RFC4302"/>. <bcp14>MUST</bcp14> be equal to Destination Options (60) or Encapsulating Security Payload (ESP) (50).</t>
        </li>
        <li>
          <t>Payload Length - Defined in <xref target="RFC4302"/>.</t>
        </li>
        <li>
          <t>Reserved - Defined in <xref target="RFC4302"/>. <bcp14>MUST</bcp14> be set to zero by the sender, and <bcp14>SHOULD</bcp14> be ignored by the recipient.</t>
        </li>
        <li>
          <t>Security Parameters Index (SPI) - Defined in <xref target="RFC4302"/>.</t>
        </li>
        <li>
          <t>Sequence Number - Defined in <xref target="RFC4302"/>.</t>
        </li>
        <li>
          <t>Integrity Check Value (ICV) - Defined in <xref target="RFC4302"/>.</t>
        </li>
      </ul>
      <t>IPsec processing of the AH and ESP headers would occur before the VPN Service Option is available for processing by tunnel egress PE.</t>
      <t>The IPv6 Destination Options Extension Header contains:</t>
      <ul spacing="normal">
        <li>
          <t>Next Header - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> identify the protocol of the customer data.</t>
        </li>
        <li>
          <t>Hdr Ext Len - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> be equal to 0.</t>
        </li>
        <li>
          <t>Options - *  Options - Defined in <xref target="RFC8200"/>.  <bcp14>MUST</bcp14> contain exactly one VPN Service Option as defined in <xref target="option"/> of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="control-plane-considerations">
      <name>Control Plane Considerations</name>
      <t>The FIB can be populated:</t>
      <ul spacing="normal">
        <li>
          <t>By an operator, using a Command Line Interface (CLI).</t>
        </li>
        <li>
          <t>By a controller, using the Path Computation Element (PCE)
Communication Protocol (PCEP) <xref target="RFC5440"/> or the Network
Configuration Protocol (NETCONF) <xref target="RFC6241"/>.</t>
        </li>
        <li>
          <t>By the Border Gateway Protocol (BGP) <xref target="RFC4271"/> <xref target="RFC4760"/>.</t>
        </li>
      </ul>
      <t>If the FIB is populated using BGP, BGP creates a Label-FIB (LFIB), exactly as it would if VPN service information were encoded in an MPLS service label. The egress PE queries the LFIB to resolve information contained by the VPN Service Option.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA requests.</t>
      <t>However, if the experiment described herein succeeds, the authors will reissue this document, to be published on the Standards Track. The reissued document will request an IPv6 Destination Option number, and contain operational recommendations reguarding a migration to a new code point.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>IETF VPN technologies assume that PE devices trust one another. If an egress PE processes a VPN Service Option from an untrusted device, VPN boundaries can be breached.</t>
      <t>The following are acceptable methods of risk mitigation:</t>
      <ul spacing="normal">
        <li>
          <t>Authenticate the packet option using the IPv6 Authentication
Header (AH) <xref target="RFC4302"/> or the IPv6 Encapsulating Security Payload
(ESP) Header <xref target="RFC4303"/>. If the ESP Header is used, it encapsulates the entire packet.</t>
        </li>
        <li>
          <t>Maintain a limited domain.</t>
        </li>
      </ul>
      <t>All nodes at the edge limited domain maintain Access Control Lists (ACLs) that discard packets that satisfy the following criteria:</t>
      <ul spacing="normal">
        <li>
          <t>Contain an IPv6 VPN Service option.</t>
        </li>
        <li>
          <t>Contain an IPv6 Destination Address that represents an interface
inside of the secure limited domain.</t>
        </li>
      </ul>
      <t>The mitigation techniques mentioned above operate in fail-open mode. See Section 3 of <xref target="I-D.wkumari-intarea-safe-limited-domains"/> for a discussion of fail-open and fail-closed modes.</t>
      <t>The mitigation techniques mentioned above also address the tunneling concerns raised in <xref target="RFC6169"/>.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>The VPN Service Option is imposed by an ingress PE and processed by an egress PE. It is not processed by any nodes along the delivery path between the ingress PE and egress PE. So, it is safe to deploy the VPN Service Option across the Internet.</t>
      <t>However, some networks discard packets that include IPv6 Destination Options. This is an impediment to deployment.</t>
      <t>Because the VPN Service Option uses an experimental code point, there
is a risk of collisions with other experiments.  Specifically, the
egress PE may process packets from another experiment that uses the
same code point.</t>
      <t>It is expected that, as with all experiments with IETF protocols,
care is taken by the operator to ensure that all nodes participating
in an experiment are carefully configured.</t>
      <t>Because the VPN Service Destination Option uses an experimental code point,
processing of this option <bcp14>MUST</bcp14> be disabled by default. Explicit configuration
is required to enable processing of the option.</t>
    </section>
    <section anchor="experimental-results">
      <name>Experimental Results</name>
      <t>Parties participating in this experiment should publish experimental results within one year of the publication of this document. Experimental results should address the following:</t>
      <ul spacing="normal">
        <li>
          <t>Effort required to deploy
          </t>
          <ul spacing="normal">
            <li>
              <t>Was deployment incremental or network-wide?</t>
            </li>
            <li>
              <t>Was there a need to synchronize configurations at each node or could nodes be configured independently?</t>
            </li>
            <li>
              <t>Did the deployment require hardware upgrade?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effort required to secure
          </t>
          <ul spacing="normal">
            <li>
              <t>Performance impact</t>
            </li>
            <li>
              <t>Effectiveness of risk mitigation with ACLs</t>
            </li>
            <li>
              <t>Cost of risk mitigation with ACLs</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Mechanism used to populate the FIB</t>
        </li>
        <li>
          <t>Scale of deployment</t>
        </li>
        <li>
          <t>Interoperability
          </t>
          <ul spacing="normal">
            <li>
              <t>Did you deploy two interoperable implementations?</t>
            </li>
            <li>
              <t>Did you experience interoperability problems?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effectiveness and sufficiency of OAM mechanisms
          </t>
          <ul spacing="normal">
            <li>
              <t>Did PING work?</t>
            </li>
            <li>
              <t>Did TRACEROUTE work?</t>
            </li>
            <li>
              <t>Did Wireshark work?</t>
            </li>
            <li>
              <t>Did TCPDUMP work?</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Gorry Fairhurst, Antoine Fressancourt, Eliot Lear and Mark Smith for their reviews and contributions to this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC6169">
          <front>
            <title>Security Concerns with IP Tunneling</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>A number of security concerns with IP tunnels are documented in this memo. The intended audience of this document includes network administrators and future protocol developers. The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed and propose strategies for the mitigation of those issues. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6169"/>
          <seriesInfo name="DOI" value="10.17487/RFC6169"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC2473">
          <front>
            <title>Generic Packet Tunneling in IPv6 Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the model and generic mechanisms for IPv6 encapsulation of Internet packets, such as IPv6 and IPv4. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2473"/>
          <seriesInfo name="DOI" value="10.17487/RFC2473"/>
        </reference>
        <reference anchor="RFC3032">
          <front>
            <title>MPLS Label Stack Encoding</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="G. Fedorkow" initials="G." surname="Fedorkow"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the encoding to be used by an LSR in order to transmit labeled packets on Point-to-Point Protocol (PPP) data links, on LAN data links, and possibly on other data links as well. This document also specifies rules and procedures for processing the various fields of the label stack encoding. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3032"/>
          <seriesInfo name="DOI" value="10.17487/RFC3032"/>
        </reference>
        <reference anchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4761">
          <front>
            <title>Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." role="editor" surname="Kompella"/>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>Virtual Private LAN Service (VPLS), also known as Transparent LAN Service and Virtual Private Switched Network service, is a useful Service Provider offering. The service offers a Layer 2 Virtual Private Network (VPN); however, in the case of VPLS, the customers in the VPN are connected by a multipoint Ethernet LAN, in contrast to the usual Layer 2 VPNs, which are point-to-point in nature.</t>
              <t>This document describes the functions required to offer VPLS, a mechanism for signaling a VPLS, and rules for forwarding VPLS frames across a packet switched network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4761"/>
          <seriesInfo name="DOI" value="10.17487/RFC4761"/>
        </reference>
        <reference anchor="RFC4762">
          <front>
            <title>Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling</title>
            <author fullname="M. Lasserre" initials="M." role="editor" surname="Lasserre"/>
            <author fullname="V. Kompella" initials="V." role="editor" surname="Kompella"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes a Virtual Private LAN Service (VPLS) solution using pseudowires, a service previously implemented over other tunneling technologies and known as Transparent LAN Services (TLS). A VPLS creates an emulated LAN segment for a given set of users; i.e., it creates a Layer 2 broadcast domain that is fully capable of learning and forwarding on Ethernet MAC addresses and that is closed to a given set of users. Multiple VPLS services can be supported from a single Provider Edge (PE) node.</t>
              <t>This document describes the control plane functions of signaling pseudowire labels using Label Distribution Protocol (LDP), extending RFC 4447. It is agnostic to discovery protocols. The data plane functions of forwarding are also described, focusing in particular on the learning of MAC addresses. The encapsulation of VPLS packets is described by RFC 4448. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4762"/>
          <seriesInfo name="DOI" value="10.17487/RFC4762"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="RFC7432">
          <front>
            <title>BGP MPLS-Based Ethernet VPN</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN). The procedures described here meet the requirements specified in RFC 7209 -- "Requirements for Ethernet VPN (EVPN)".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7432"/>
          <seriesInfo name="DOI" value="10.17487/RFC7432"/>
        </reference>
        <reference anchor="RFC8077">
          <front>
            <title>Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)</title>
            <author fullname="L. Martini" initials="L." role="editor" surname="Martini"/>
            <author fullname="G. Heron" initials="G." role="editor" surname="Heron"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>Layer 2 services (such as Frame Relay, Asynchronous Transfer Mode, and Ethernet) can be emulated over an MPLS backbone by encapsulating the Layer 2 Protocol Data Units (PDUs) and then transmitting them over pseudowires (PWs). It is also possible to use pseudowires to provide low-rate Time-Division Multiplexed and Synchronous Optical NETworking circuit emulation over an MPLS-enabled network. This document specifies a protocol for establishing and maintaining the pseudowires, using extensions to the Label Distribution Protocol (LDP). Procedures for encapsulating Layer 2 PDUs are specified in other documents.</t>
              <t>This document is a rewrite of RFC 4447 for publication as an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="84"/>
          <seriesInfo name="RFC" value="8077"/>
          <seriesInfo name="DOI" value="10.17487/RFC8077"/>
        </reference>
        <reference anchor="V6MSG">
          <front>
            <title>Internet Protocol Version 6 (IPv6) Parameters: Destination Options and Hop-by-Hop Options</title>
            <author>
              <organization>Internet Assigned Numbers Authority (IANA)</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml#ipv6-parameters-2"/>
        </reference>
        <reference anchor="I-D.wkumari-intarea-safe-limited-domains">
          <front>
            <title>Safe(r) Limited Domains</title>
            <author fullname="Warren &quot;Ace&quot; Kumari" initials="W. A." surname="Kumari">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Andrew Alston" initials="A." surname="Alston">
              <organization>Alston Networks</organization>
            </author>
            <author fullname="Eric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Cisco</organization>
            </author>
            <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
              <organization>Independent</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Documents describing protocols that are only intended to be used
   within "limited domains" often do not clearly define how the boundary
   of the limited domain is implemented and enforced, or require that
   operators of these limited domains perfectly filter at all of the
   boundary nodes of the domain to protect the rest of the global
   Internet from these protocols and vice-versa.

   This document discusses some design principles and offers mechanisms
   to allow protocols that are designed to operate in a limited domain
   "fail-closed" rather than "fail-open", thereby making these protocols
   safer to deploy on the Internet.

   These mechanism are not applicable to all protocols intended for use
   in a limited domain, but if implemented on certain classes of
   protocols, they can significantly reduce the risks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
