<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-6man-vpn-dest-opt-06" category="exp" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Svc. Dest. Opt.">The IPv6 VPN Service Destination Option</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-6man-vpn-dest-opt-06"/>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Herndon</city>
          <region>Virginia</region>
          <country>USA</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author initials="X." surname="Li" fullname="Xing Li">
      <organization>CERNET Center/Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xing@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author initials="Y." surname="Kamite" fullname="Yuji Kamite">
      <organization>NTT Communications Corporation</organization>
      <address>
        <postal>
          <city>3-4-1 Shibaura</city>
          <region>Minato-ku</region>
          <country>Japan</country>
        </postal>
        <email>y.kamite@ntt.com</email>
      </address>
    </author>
    <author initials="L." surname="Jalil" fullname="Luay Jalil">
      <organization>Verizon</organization>
      <address>
        <postal>
          <city>Richardson</city>
          <region>Texas</region>
          <country>USA</country>
        </postal>
        <email>luay.jalil@one.verizon.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="05"/>
    <area>Internet</area>
    <workgroup>6man</workgroup>
    <keyword>IPv6, Destination Option, VPN</keyword>
    <abstract>
      <?line 96?>

<t>This document describes an experiment in which VPN service information is encoded in an experimental IPv6 Destination Option. The experimental IPv6 Destination Option is called the VPN Service Option.</t>
      <t>One purpose of this experiment is to demonstrate that the VPN Service Option can be deployed in a production network.  Another purpose is to demonstrate that the security measures described in this document are sufficient to protect a VPN.  Finally, this document encourages replication of the experiment.</t>
    </abstract>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Generic Packet Tunneling <xref target="RFC2473"/> allows a router in one network to encapsulate a packet in an IP header and send it through the Internet to another router in another network. The receiving router removes the outer IP header and forwards the original packet into its own network. This facilitates connectivity between networks that share a private addressing <xref target="RFC1918"/> <xref target="RFC4193"/> plan but are not connected by a direct link.</t>
      <t>The IETF refined this concept in a Framework For Virtual Private Networks (VPN) <xref target="RFC2764"/>. It also standardized the following VPN technologies:</t>
      <ul spacing="normal">
        <li>
          <t>IPSec VPN <xref target="RFC3884"/>.</t>
        </li>
        <li>
          <t>Layer 3 VPN (L3VPN) <xref target="RFC4364"/>.</t>
        </li>
        <li>
          <t>Virtual Private LAN Service (VPLS) <xref target="RFC4761"/><xref target="RFC4762"/>.</t>
        </li>
        <li>
          <t>Layer 2 VPN (L2VPN) <xref target="RFC6624"/>.</t>
        </li>
        <li>
          <t>Ethernet VPN (EVPN) <xref target="RFC7432"/>.</t>
        </li>
        <li>
          <t>Pseudowires <xref target="RFC8077"/>.</t>
        </li>
        <li>
          <t>SRv6 <xref target="RFC8986"/>.</t>
        </li>
        <li>
          <t>EVPN / NVO3 <xref target="RFC9469"/>.</t>
        </li>
      </ul>
      <t>The VPN technologies mentioned above share the following characteristics:</t>
      <ul spacing="normal">
        <li>
          <t>An ingress Provider Edge (PE) router encapsulates customer data in a tunnel header. The tunnel header includes service information. Service Information identifies a Forwarding Information Base (FIB) entry on an egress PE router.</t>
        </li>
        <li>
          <t>The ingress PE router sends the encapsulated packet to the egress PE router.</t>
        </li>
        <li>
          <t>The egress PE router receives the encapsulated packet.</t>
        </li>
        <li>
          <t>The egress PE router searches its FIB for an entry that matches the incoming service information. If it finds one, it removes the tunnel header and forwards the customer data to a Customer Edge (CE) device, as per the FIB entry. If it does not find a matching FIB entry, it discards the packet.</t>
        </li>
      </ul>
      <t>This document describes an experiment in which VPN service information is encoded in an experimental IPv6 Destination Option <xref target="RFC8200"/>. The experimental IPv6 Destination Option is called the VPN Service Option.</t>
      <t>One purpose of this experiment is to demonstrate that the VPN Service Option can be deployed in a production network. Another purpose is to demonstrate that the security measures described in <xref target="security"/> of this document are sufficient to protect a VPN. In particular, experimenters should report vulnerabilities that:</t>
      <ul spacing="normal">
        <li>
          <t>allow nodes outside of the VPN to exchange packets with nodes inside of the VPN</t>
        </li>
        <li>
          <t>allow nodes outside of the VPN to inject packets into the VPN</t>
        </li>
        <li>
          <t>allow nodes outside of the VPN to attract VPN packets to themselves</t>
        </li>
      </ul>
      <t>Finally, this document encourages replication of the experiment, so that operational issues can be discovered.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>The following requirements are satisfied by networks that deploy the IPv6 VPN Service Destination Option:</t>
      <ol spacing="normal" type="1"><li>
          <t>Solution must not require configuration on CE devices</t>
        </li>
        <li>
          <t>Solution must support many VPNs on a single egress PE router</t>
        </li>
        <li>
          <t>Solution must not require the configuration of multiple IPv6 addresses to support different VPNs at the same PE</t>
        </li>
        <li>
          <t>Solution does not require the use of a sub-IP data plane encapsulation to carry the VPN ID.</t>
        </li>
      </ol>
      <t><xref target="solutions"/> demonstrates that no other VPN technology satisfies all of the requirements mentioned above.</t>
      <table anchor="solutions">
        <name>VPN Solutions</name>
        <thead>
          <tr>
            <th align="left">VPN Type</th>
            <th align="left">Req. 1</th>
            <th align="left">Req. 2</th>
            <th align="left">Req. 3</th>
            <th align="left">Req. 4</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Generic Packet Tunneling <xref target="RFC2473"/></td>
            <td align="left">YES</td>
            <td align="left">NO</td>
            <td align="left">N/A</td>
            <td align="left">YES</td>
          </tr>
          <tr>
            <td align="left">IPSec VPN <xref target="RFC3884"/></td>
            <td align="left">NO</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
          </tr>
          <tr>
            <td align="left">Layer 3 VPN (L3VPN) <xref target="RFC4364"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">Virtual Private LAN Service (VPLS) <xref target="RFC4761"/><xref target="RFC4762"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">Layer 2 VPN (L2VPN) <xref target="RFC6624"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">Ethernet VPN (EVPN) <xref target="RFC7432"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">Pseudowires <xref target="RFC8077"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">SRv6 <xref target="RFC8986"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
            <td align="left">YES</td>
          </tr>
          <tr>
            <td align="left">EVPN / NVO3 <xref target="RFC9469"/></td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">NO</td>
          </tr>
          <tr>
            <td align="left">VPN Service Destination Option</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
            <td align="left">YES</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="option">
      <name>The VPN Service Option</name>
      <t>The VPN Service Option is an IPv6 Destination Option encoded according to rules defined in <xref target="RFC8200"/>.</t>
      <t>As described in section 4.2 of <xref target="RFC8200"/> a IPv6 Destination Option contains three fields: Option Type, Opt Data Len, and Option Data. In the VPN Service Option these fields are used as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Option Type: 8-bit selector.  VPN Service Option. This field <bcp14>MUST</bcp14> be set to RFC3692-style Experiment (0x5E) <xref target="V6MSG"/>.  See Note below.</t>
        </li>
        <li>
          <t>Opt Data Len - 8-bit unsigned integer.  Length of the option, in
 bytes, excluding the Option Type and Option Length fields.  This
 field <bcp14>MUST</bcp14> be set to 4.</t>
        </li>
        <li>
          <t>Option Data - 32 bits.  VPN Service Information that identifies a FIB entry on the egress PE. The FIB entry determines how the egress PE will forward customer data to a CE device.</t>
        </li>
      </ul>
      <t>The VPN Service Option <bcp14>MAY</bcp14> appear in a Destination Options header
that immediately precedes an upper-layer header.  It <bcp14>MUST NOT</bcp14> appear in any other
extension header.  If a receiver finds the VPN Service Option in any other
extension header, it <bcp14>MUST NOT</bcp14> recognize the option.
The packet <bcp14>MUST</bcp14> be processed according to the setting of the two highest 
order bits of the Option Type (see NOTE below).</t>
      <t>NOTE: For this experiment, the Option Type is set to '01011110', i.e.,
0x5E. The highest-order two bits are set to 01 indicating that the
required action by a destination node that does not recognize the option
is to discard the packet. The third highest-order bit is set to 0 
indicating that Option Data cannot be modified along the path between
the packet's source and its destination. The remaining low-order bits
are set to '11110' to indicate the single IPv6 Destination Option Type
code point available in the registry for experimentation.</t>
    </section>
    <section anchor="forwarding-plane-considerations">
      <name>Forwarding Plane Considerations</name>
      <t>The ingress PE encapsulates the customer data in a tunnel header. The tunnel header <bcp14>MUST</bcp14> contain an IPv6 header and a Destination Options header that immediately precedes the customer data. It <bcp14>MAY</bcp14> also include any legal combination of IPv6 extension headers.</t>
      <t>The IPv6 header contains:</t>
      <ul spacing="normal">
        <li>
          <t>Version - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> be equal to 6.</t>
        </li>
        <li>
          <t>Traffic Class - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Flow Label - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Payload Length - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Next Header - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Hop Limit - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Source Address - Defined in <xref target="RFC8200"/>. Represents an interface on the ingress PE router. This address <bcp14>SHOULD</bcp14> be chosen according to guidance provided in <xref target="RFC6724"/>.</t>
        </li>
        <li>
          <t>Destination Address - Defined in <xref target="RFC8200"/>. Represents an interface on the egress PE router. This address <bcp14>SHOULD</bcp14> be chosen according to guidance provided in <xref target="RFC6724"/>.</t>
        </li>
      </ul>
      <t>The IPv6 Destination Options Extension Header contains:</t>
      <ul spacing="normal">
        <li>
          <t>Next Header - Defined in <xref target="RFC8200"/>. <bcp14>MUST</bcp14> identify the protocol of the customer data.</t>
        </li>
        <li>
          <t>Hdr Ext Len - Defined in <xref target="RFC8200"/>.</t>
        </li>
        <li>
          <t>Options - Defined in <xref target="RFC8200"/>.  In this experiment, the Options field <bcp14>MUST</bcp14> contain exactly one VPN Service Option as defined in <xref target="option"/> of this document. It <bcp14>MAY</bcp14> also contain any legal combination of other Destination Options.</t>
        </li>
      </ul>
    </section>
    <section anchor="control-plane-considerations">
      <name>Control Plane Considerations</name>
      <t>The FIB can be populated:</t>
      <ul spacing="normal">
        <li>
          <t>By an operator, using a Command Line Interface (CLI).</t>
        </li>
        <li>
          <t>By a controller, using the Path Computation Element (PCE)
Communication Protocol (PCEP) <xref target="RFC5440"/> or the Network
Configuration Protocol (NETCONF) <xref target="RFC6241"/>.</t>
        </li>
        <li>
          <t>By the Border Gateway Protocol (BGP) <xref target="RFC4271"/> <xref target="RFC4760"/>.</t>
        </li>
      </ul>
      <t>If the FIB is populated using BGP, BGP creates a FIB entry exactly as it would if VPN service information were encoded in an MPLS service label. The leading 12 bits of the service information will be 0 and the next 20 bits will identify an MPLS FIB entry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA requests.</t>
      <t>However, if the experiment described herein succeeds, the authors will reissue this document, to be published on the Standards Track. The reissued document will request an IPv6 Destination Option number, and contain operational recommendations regarding a migration to a new code point.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>IETF VPN technologies assume that PE devices trust one another. If an egress PE processes a VPN Service Option from an untrusted device, VPN boundaries can be breached.</t>
      <t>The following are acceptable methods of risk mitigation:</t>
      <ul spacing="normal">
        <li>
          <t>Authenticate the tunnel connecting the ingress PE to the egress PE 
    using the IPv6 Authentication Header (AH) <xref target="RFC4302"/> or the IPv6 Encapsulating Security Payload
(ESP) Header <xref target="RFC4303"/>.</t>
        </li>
        <li>
          <t>Maintain a limited domain.</t>
        </li>
      </ul>
      <t>All nodes at the edge limited domain maintain Access Control Lists (ACLs) that discard packets that satisfy the following criteria:</t>
      <ul spacing="normal">
        <li>
          <t>Contain an IPv6 VPN Service option.</t>
        </li>
        <li>
          <t>Contain an IPv6 Destination Address that represents an interface
inside of the secure limited domain.</t>
        </li>
      </ul>
      <t>The mitigation techniques mentioned above operate in fail-open mode. See Section 3 of <xref target="I-D.wkumari-intarea-safe-limited-domains"/> for a discussion of fail-open and fail-closed modes.</t>
      <t>The mitigation techniques mentioned above also address the tunneling concerns raised in <xref target="RFC6169"/>.</t>
    </section>
    <section anchor="deployment-considerations">
      <name>Deployment Considerations</name>
      <t>The VPN Service Option is imposed by an ingress PE and processed by an egress PE. It is not processed by any nodes along the delivery path between the ingress PE and egress PE. So, it is safe to deploy the VPN Service Option across the Internet.</t>
      <t>However, some networks discard packets that include IPv6 Destination Options. This is an impediment to deployment.</t>
      <t>Because the VPN Service Option uses an experimental code point, there
is a risk of collisions with other experiments.  Specifically, the
egress PE may process packets from another experiment that uses the
same code point.</t>
      <t>It is expected that, as with all experiments with IETF protocols,
care is taken by the operator to ensure that all nodes participating
in an experiment are carefully configured.</t>
      <t>Because the VPN Service Destination Option uses an experimental code point,
processing of this option <bcp14>MUST</bcp14> be disabled by default. Explicit configuration
is required to enable processing of the option.</t>
    </section>
    <section anchor="experimental-results">
      <name>Experimental Results</name>
      <t>Parties participating in this experiment should publish experimental results within one year of the publication of this document. Experimental results should address the following:</t>
      <ul spacing="normal">
        <li>
          <t>Effort required to deploy
          </t>
          <ul spacing="normal">
            <li>
              <t>Was deployment incremental or network-wide?</t>
            </li>
            <li>
              <t>Was there a need to synchronize configurations at each node or could nodes be configured independently?</t>
            </li>
            <li>
              <t>Did the deployment require hardware upgrade?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effort required to secure
          </t>
          <ul spacing="normal">
            <li>
              <t>Performance impact</t>
            </li>
            <li>
              <t>Effectiveness of risk mitigation with ACLs</t>
            </li>
            <li>
              <t>Cost of risk mitigation with ACLs</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Mechanism used to populate the FIB</t>
        </li>
        <li>
          <t>Scale of deployment</t>
        </li>
        <li>
          <t>Interoperability
          </t>
          <ul spacing="normal">
            <li>
              <t>Did you deploy two interoperable implementations?</t>
            </li>
            <li>
              <t>Did you experience interoperability problems?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effectiveness and sufficiency of OAM mechanisms
          </t>
          <ul spacing="normal">
            <li>
              <t>Did PING work?</t>
            </li>
            <li>
              <t>Did TRACEROUTE work?</t>
            </li>
            <li>
              <t>Did Wireshark work?</t>
            </li>
            <li>
              <t>Did TCPDUMP work?</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Gorry Fairhurst, Antoine Fressancourt, Eliot Lear and Mark Smith for their reviews and contributions to this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6169">
          <front>
            <title>Security Concerns with IP Tunneling</title>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="J. Hoagland" initials="J." surname="Hoagland"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>A number of security concerns with IP tunnels are documented in this memo. The intended audience of this document includes network administrators and future protocol developers. The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed and propose strategies for the mitigation of those issues. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6169"/>
          <seriesInfo name="DOI" value="10.17487/RFC6169"/>
        </reference>
        <reference anchor="RFC6724">
          <front>
            <title>Default Address Selection for Internet Protocol Version 6 (IPv6)</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <author fullname="R. Draves" initials="R." surname="Draves"/>
            <author fullname="A. Matsumoto" initials="A." surname="Matsumoto"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes two algorithms, one for source address selection and one for destination address selection. The algorithms specify default behavior for all Internet Protocol version 6 (IPv6) implementations. They do not override choices made by applications or upper-layer protocols, nor do they preclude the development of more advanced mechanisms for address selection. The two algorithms share a common context, including an optional mechanism for allowing administrators to provide policy that can override the default behavior. In dual-stack implementations, the destination address selection algorithm can consider both IPv4 and IPv6 addresses -- depending on the available source addresses, the algorithm might prefer IPv6 addresses over IPv4 addresses, or vice versa.</t>
              <t>Default address selection as defined in this specification applies to all IPv6 nodes, including both hosts and routers. This document obsoletes RFC 3484. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6724"/>
          <seriesInfo name="DOI" value="10.17487/RFC6724"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC2473">
          <front>
            <title>Generic Packet Tunneling in IPv6 Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the model and generic mechanisms for IPv6 encapsulation of Internet packets, such as IPv6 and IPv4. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2473"/>
          <seriesInfo name="DOI" value="10.17487/RFC2473"/>
        </reference>
        <reference anchor="RFC2764">
          <front>
            <title>A Framework for IP Based Virtual Private Networks</title>
            <author fullname="B. Gleeson" initials="B." surname="Gleeson"/>
            <author fullname="A. Lin" initials="A." surname="Lin"/>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="G. Armitage" initials="G." surname="Armitage"/>
            <author fullname="A. Malis" initials="A." surname="Malis"/>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes a framework for Virtual Private Networks (VPNs) running across IP backbones. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2764"/>
          <seriesInfo name="DOI" value="10.17487/RFC2764"/>
        </reference>
        <reference anchor="RFC3032">
          <front>
            <title>MPLS Label Stack Encoding</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="D. Tappan" initials="D." surname="Tappan"/>
            <author fullname="G. Fedorkow" initials="G." surname="Fedorkow"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the encoding to be used by an LSR in order to transmit labeled packets on Point-to-Point Protocol (PPP) data links, on LAN data links, and possibly on other data links as well. This document also specifies rules and procedures for processing the various fields of the label stack encoding. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3032"/>
          <seriesInfo name="DOI" value="10.17487/RFC3032"/>
        </reference>
        <reference anchor="RFC3884">
          <front>
            <title>Use of IPsec Transport Mode for Dynamic Routing</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="Y. Wang" initials="Y." surname="Wang"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>IPsec can secure the links of a multihop network to protect communication between trusted components, e.g., for a secure virtual network (VN), overlay, or virtual private network (VPN). Virtual links established by IPsec tunnel mode can conflict with routing and forwarding inside VNs because IP routing depends on references to interfaces and next-hop IP addresses. The IPsec tunnel mode specification is ambiguous on this issue, so even compliant implementations cannot be trusted to avoid conflicts. An alternative to tunnel mode uses non-IPsec IPIP encapsulation together with IPsec transport mode, which we call IIPtran. IPIP encapsulation occurs as a separate initial step, as the result of a forwarding lookup of the VN packet. IPsec transport mode processes the resulting (tunneled) IP packet with an SA determined through a security association database (SAD) match on the tunnel header. IIPtran supports dynamic routing inside the VN without changes to the current IPsec architecture. IIPtran demonstrates how to configure any compliant IPsec implementation to avoid the aforementioned conflicts. IIPtran is also compared to several alternative mechanisms for VN routing and their respective impact on IPsec, routing, policy enforcement, and interactions with the Internet Key Exchange (IKE). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3884"/>
          <seriesInfo name="DOI" value="10.17487/RFC3884"/>
        </reference>
        <reference anchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4302">
          <front>
            <title>IP Authentication Header</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4302"/>
          <seriesInfo name="DOI" value="10.17487/RFC4302"/>
        </reference>
        <reference anchor="RFC4303">
          <front>
            <title>IP Encapsulating Security Payload (ESP)</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality. This document obsoletes RFC 2406 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4303"/>
          <seriesInfo name="DOI" value="10.17487/RFC4303"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4761">
          <front>
            <title>Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." role="editor" surname="Kompella"/>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>Virtual Private LAN Service (VPLS), also known as Transparent LAN Service and Virtual Private Switched Network service, is a useful Service Provider offering. The service offers a Layer 2 Virtual Private Network (VPN); however, in the case of VPLS, the customers in the VPN are connected by a multipoint Ethernet LAN, in contrast to the usual Layer 2 VPNs, which are point-to-point in nature.</t>
              <t>This document describes the functions required to offer VPLS, a mechanism for signaling a VPLS, and rules for forwarding VPLS frames across a packet switched network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4761"/>
          <seriesInfo name="DOI" value="10.17487/RFC4761"/>
        </reference>
        <reference anchor="RFC4762">
          <front>
            <title>Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling</title>
            <author fullname="M. Lasserre" initials="M." role="editor" surname="Lasserre"/>
            <author fullname="V. Kompella" initials="V." role="editor" surname="Kompella"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document describes a Virtual Private LAN Service (VPLS) solution using pseudowires, a service previously implemented over other tunneling technologies and known as Transparent LAN Services (TLS). A VPLS creates an emulated LAN segment for a given set of users; i.e., it creates a Layer 2 broadcast domain that is fully capable of learning and forwarding on Ethernet MAC addresses and that is closed to a given set of users. Multiple VPLS services can be supported from a single Provider Edge (PE) node.</t>
              <t>This document describes the control plane functions of signaling pseudowire labels using Label Distribution Protocol (LDP), extending RFC 4447. It is agnostic to discovery protocols. The data plane functions of forwarding are also described, focusing in particular on the learning of MAC addresses. The encapsulation of VPLS packets is described by RFC 4448. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4762"/>
          <seriesInfo name="DOI" value="10.17487/RFC4762"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6624">
          <front>
            <title>Layer 2 Virtual Private Networks Using BGP for Auto-Discovery and Signaling</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="B. Kothari" initials="B." surname="Kothari"/>
            <author fullname="R. Cherukuri" initials="R." surname="Cherukuri"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM circuits have been around a long time; more recently, Ethernet VPNs, including Virtual Private LAN Service, have become popular. Traditional L2VPNs often required a separate Service Provider infrastructure for each type and yet another for the Internet and IP VPNs. In addition, L2VPN provisioning was cumbersome. This document presents a new approach to the problem of offering L2VPN services where the L2VPN customer's experience is virtually identical to that offered by traditional L2VPNs, but such that a Service Provider can maintain a single network for L2VPNs, IP VPNs, and the Internet, as well as a common provisioning methodology for all services. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6624"/>
          <seriesInfo name="DOI" value="10.17487/RFC6624"/>
        </reference>
        <reference anchor="RFC7432">
          <front>
            <title>BGP MPLS-Based Ethernet VPN</title>
            <author fullname="A. Sajassi" initials="A." role="editor" surname="Sajassi"/>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="A. Isaac" initials="A." surname="Isaac"/>
            <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN). The procedures described here meet the requirements specified in RFC 7209 -- "Requirements for Ethernet VPN (EVPN)".</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7432"/>
          <seriesInfo name="DOI" value="10.17487/RFC7432"/>
        </reference>
        <reference anchor="RFC8077">
          <front>
            <title>Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)</title>
            <author fullname="L. Martini" initials="L." role="editor" surname="Martini"/>
            <author fullname="G. Heron" initials="G." role="editor" surname="Heron"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>Layer 2 services (such as Frame Relay, Asynchronous Transfer Mode, and Ethernet) can be emulated over an MPLS backbone by encapsulating the Layer 2 Protocol Data Units (PDUs) and then transmitting them over pseudowires (PWs). It is also possible to use pseudowires to provide low-rate Time-Division Multiplexed and Synchronous Optical NETworking circuit emulation over an MPLS-enabled network. This document specifies a protocol for establishing and maintaining the pseudowires, using extensions to the Label Distribution Protocol (LDP). Procedures for encapsulating Layer 2 PDUs are specified in other documents.</t>
              <t>This document is a rewrite of RFC 4447 for publication as an Internet Standard.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="84"/>
          <seriesInfo name="RFC" value="8077"/>
          <seriesInfo name="DOI" value="10.17487/RFC8077"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC9469">
          <front>
            <title>Applicability of Ethernet Virtual Private Network (EVPN) to Network Virtualization over Layer 3 (NVO3) Networks</title>
            <author fullname="J. Rabadan" initials="J." role="editor" surname="Rabadan"/>
            <author fullname="M. Bocci" initials="M." surname="Bocci"/>
            <author fullname="S. Boutros" initials="S." surname="Boutros"/>
            <author fullname="A. Sajassi" initials="A." surname="Sajassi"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>An Ethernet Virtual Private Network (EVPN) provides a unified control plane that solves the issues of Network Virtualization Edge (NVE) auto-discovery, tenant Media Access Control (MAC) / IP dissemination, and advanced features in a scablable way as required by Network Virtualization over Layer 3 (NVO3) networks. EVPN is a scalable solution for NVO3 networks and keeps the independence of the underlay IP Fabric, i.e., there is no need to enable Protocol Independent Multicast (PIM) in the underlay network and maintain multicast states for tenant Broadcast Domains. This document describes the use of EVPN for NVO3 networks and discusses its applicability to basic Layer 2 and Layer 3 connectivity requirements and to advanced features such as MAC Mobility, MAC Protection and Loop Protection, multihoming, Data Center Interconnect (DCI), and much more. No new EVPN procedures are introduced.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9469"/>
          <seriesInfo name="DOI" value="10.17487/RFC9469"/>
        </reference>
        <reference anchor="V6MSG">
          <front>
            <title>Internet Protocol Version 6 (IPv6) Parameters: Destination Options and Hop-by-Hop Options</title>
            <author>
              <organization>Internet Assigned Numbers Authority (IANA)</organization>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml#ipv6-parameters-2"/>
        </reference>
        <reference anchor="I-D.wkumari-intarea-safe-limited-domains">
          <front>
            <title>Safe(r) Limited Domains</title>
            <author fullname="Warren Kumari" initials="W." surname="Kumari">
              <organization>Google, LLC</organization>
            </author>
            <author fullname="Andrew Alston" initials="A." surname="Alston">
              <organization>Alston Networks</organization>
            </author>
            <author fullname="Eric Vyncke" initials="E." surname="Vyncke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Cisco</organization>
            </author>
            <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
              <organization>Independent</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Documents describing protocols that are only intended to be used
   within "limited domains" often do not clearly define how the boundary
   of the limited domain is implemented and enforced, or require that
   operators of these limited domains perfectly filter at all of the
   boundary nodes of the domain to protect the rest of the global
   Internet from these protocols and vice-versa.

   This document discusses some design principles and offers mechanisms
   to allow protocols that are designed to operate in a limited domain
   "fail-closed" rather than "fail-open", thereby making these protocols
   safer to deploy on the Internet.

   These mechanism are not applicable to all protocols intended for use
   in a limited domain, but if implemented on certain classes of
   protocols, they can significantly reduce the risks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
