<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-idr-entropy-label-15" category="std" consensus="true" submissionType="IETF" xml:lang="en" updates="6790, 7447" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="NHC">BGP Next Hop Dependent Characteristics Attribute</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-idr-entropy-label-15"/>
    <author initials="B." surname="Decraene" fullname="Bruno Decraene" role="editor">
      <organization>Orange</organization>
      <address>
        <email>bruno.decraene@orange.com</email>
      </address>
    </author>
    <author initials="J. G." surname="Scudder" fullname="John G. Scudder" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <email>jgs@juniper.net</email>
      </address>
    </author>
    <author initials="W." surname="Henderickx" fullname="Wim Henderickx">
      <organization>Nokia</organization>
      <address>
        <email>wim.henderickx@nokia.com</email>
      </address>
    </author>
    <author initials="K." surname="Kompella" fullname="Kireeti Kompella">
      <organization>Juniper Networks</organization>
      <address>
        <email>kireeti@juniper.net</email>
      </address>
    </author>
    <author initials="S." surname="Mohanty" fullname="Satya Mohanty">
      <organization>Zscaler</organization>
      <address>
        <email>smohanty@zscaler.com</email>
      </address>
    </author>
    <author initials="J." surname="Uttaro" fullname="James Uttaro">
      <organization>Independent Contributor</organization>
      <address>
        <email>juttaro@ieee.org</email>
      </address>
    </author>
    <author initials="B." surname="Wen" fullname="Bin Wen">
      <organization>Comcast</organization>
      <address>
        <email>Bin_Wen@comcast.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="20"/>
    <area>rtg</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>bgp</keyword>
    <keyword>nhc</keyword>
    <keyword>entropy label</keyword>
    <abstract>
      <?line 72?>

<t>RFC 5492 allows a BGP speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain characteristics to be conveyed further.  In particular, it is useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP transitive attribute to carry such information, the "Next Hop Dependent Characteristics Attribute," or NHC. Unlike the capabilities defined by RFC 5492, the characteristics conveyed in the NHC apply solely to the routes advertised by the BGP UPDATE that contains the particular NHC.</t>
      <t>This specification also defines an NHC characteristic that can be used to advertise the ability to process the MPLS Entropy Label as an egress LSR for all NLRI advertised in the BGP UPDATE.  It updates RFC 6790 and RFC 7447 concerning this BGP signaling.</t>
    </abstract>
  </front>
  <middle>
    <?line 80?>

<section anchor="intro">
      <name>Introduction</name>
      <t><xref target="RFC5492"/> allows a Border Gateway Protocol (BGP) speaker to advertise its capabilities to its peer. When a route is propagated beyond the immediate peer, it is useful to allow certain characteristics to be conveyed further.  In particular, it may be useful to advertise forwarding plane features.</t>
      <t>This specification defines a BGP optional transitive attribute to carry such information, the "Next Hop Dependent Characteristics Attribute", or NHC.</t>
      <t>Since the NHC is intended chiefly for conveying information about forwarding plane features, it needs to be regenerated whenever the BGP route's next hop is changed. Since owing to the properties of BGP transitive attributes this can't be guaranteed (an intermediate router that doesn't implement this specification would be expected to propagate the NHC as opaque data), the NHC encodes the next hop of its originator, or the router that most recently updated the attribute. If the NHC passes through a router that changes the next hop without regenerating the NHC, they will fail to match when later examined, and the recipient can act accordingly. This scheme allows NHC support to be introduced into a network incrementally. Informally, the intent is that,</t>
      <ul spacing="normal">
        <li>
          <t>If a router is not changing the next hop, it can obliviously propagate the NHC just like any other optional transitive attribute.</t>
        </li>
        <li>
          <t>If a router is changing the next hop, then it has to be able to vouch for every characteristic it includes in the NHC.</t>
        </li>
      </ul>
      <t>Complete details are provided in <xref target="tbrc"/>.</t>
      <t>An NHC carried in a given BGP UPDATE message conveys information that relates to all Network Layer Reachability Information (NLRI) advertised in that particular UPDATE, and only to those NLRI. A different UPDATE message originated by the same source might not include an NHC, and if so, NLRI carried in that UPDATE would not be affected by the NHC. By implication, if a router wishes to use NHC to describe all NLRI it originates, it needs to include an NHC with each UPDATE it sends.</t>
      <t>Informally, a characteristic included in a given NHC should not be thought of as a characteristic of the next hop, but rather a characteristic of the path, that depends on the ability of the next hop to support it. Hence it is said to be "dependent on" the next hop.</t>
      <t>This specification also defines an NHC characteristic, called "ELCv3", to advertise the ability to process the Multiprotocol Label Switching (MPLS) Entropy Label as an egress Label Switching Router (LSR) for all NLRI advertised in the BGP UPDATE.  It updates <xref target="RFC6790"/> and <xref target="RFC7447"/> with regard to this BGP signaling, this is further discussed in <xref target="elcv3"/>. Although ELCv3 is only relevant to NLRI of labeled address families, a future NHC characteristic might be applicable to non-labeled NLRI, or to both, irrespective of labels. (The term "labeled address family" is defined in the first paragraph of Section 3.5 of <xref target="RFC9012"/>. In this document, we use the term "labeled NLRI" as a short form of "NLRI of a labeled address family.")</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="tbrc">
      <name>BGP Next Hop Dependent Characteristics Attribute</name>
      <section anchor="encoding">
        <name>Encoding</name>
        <t>The BGP Next Hop Dependent Characteristics attribute (NHC attribute, or just NHC) is an optional, transitive BGP path attribute with type code 39. The NHC always includes a network layer address identifying the next hop of the route the NHC accompanies. The NHC signals potentially useful information related to the forwarding plane features, so it is desirable to make it transitive to ensure propagation across BGP speakers (e.g., route reflectors) that do not change the next hop and are therefore not in the forwarding path. The next hop data is to ensure correctness if it traverses BGP speakers that do not understand the NHC. This is further explained below.</t>
        <t>The Attribute Data field of the NHC attribute is encoded as a header portion that identifies the router that created or most recently updated the attribute, followed by one or more Type-Length-Value (TLV) triples:</t>
        <figure anchor="nhcformat">
          <name>NHC Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Address Family Identifier   |     SAFI      | Next Hop Len  |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~             Network Address of Next Hop (variable)            ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                 Characteristic TLVs (variable)                ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The meanings of the header fields (Address Family Identifier, SAFI or Subsequent Address Family Identifier, Length of Next Hop, and Network Address of Next Hop) are as given in Section 3 of <xref target="RFC4760"/>.</t>
        <t>In turn, each Characteristic is a TLV:</t>
        <figure>
          <name>Characteristic TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      Characteristic Code      |      Characteristic Length    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   ~                Characteristic Value (variable)                ~
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Characteristic Code: a two-octet unsigned integer that indicates the type of characteristic advertised and unambiguously identifies an individual characteristic.</t>
        <t>Characteristic Length: a two-octet unsigned integer that indicates the length, in octets, of the Characteristic Value field.  A length of 0 indicates that the Characteristic Value field is zero-length, i.e. it has a null value.</t>
        <t>Characteristic Value: a variable-length field.  It is interpreted according to the value of the Characteristic Code.</t>
        <t>A BGP speaker <bcp14>MUST NOT</bcp14> include more than one instance of a characteristic with the same Characteristic Code, Characteristic Length, and Characteristic Value.  Note, however, that processing multiple instances of such a characteristic does not require special handling, as additional instances do not change the meaning of the announced characteristic; thus, a BGP speaker <bcp14>MUST</bcp14> be prepared to accept such multiple instances.</t>
        <t>BGP speakers <bcp14>MAY</bcp14> include more than one instance of a characteristic (as identified by the Characteristic Code) with different Characteristic Value.  Processing of these characteristic instances is specific to the Characteristic Code and <bcp14>MUST</bcp14> be described in the document introducing the new characteristic.</t>
        <t>Characteristic TLVs <bcp14>MUST</bcp14> be placed in the NHC in increasing order of Characteristic Code. (In the event of multiple instances of a characteristic with the same Characteristic Code as discussed above, no further sorting order is defined here.)  Although the major sorting order is mandated, an implementation <bcp14>MUST</bcp14> elect to be prepared to consume characteristics in any order, for robustness reasons.</t>
      </section>
      <section anchor="sending-the-nhc">
        <name>Sending the NHC</name>
        <t>Suppose a BGP speaker S has a route R it wishes to advertise with next hop N to its peer.</t>
        <t>If S is originating R into BGP, it <bcp14>MAY</bcp14> include an NHC attribute with it, that carries characteristic TLVs that describe aspects of R. S <bcp14>MUST</bcp14> set the next hop depicted in the header portion of the NHC to be equal to N, using the encoding given above.</t>
        <t>If S has received R from some other BGP speaker, two possibilities exist. First, S could be propagating R without changing N. In that case, S does not need to take any special action, it <bcp14>SHOULD</bcp14> simply propagate the NHC unchanged unless specifically configured otherwise. Indeed, we observe that this is no different from the default action a BGP speaker takes with an unrecognized optional transitive attribute -- it is treated as opaque data and propagated.</t>
        <t>Second, S could be changing R in some way, and in particular, it could be changing N. If S has changed N it <bcp14>MUST NOT</bcp14> propagate the NHC unchanged. It <bcp14>SHOULD</bcp14> include a newly-constructed NHC attribute with R, constructed as described above in the "originating R into BGP" case. Any given characteristic TLV carried by the newly-constructed NHC attribute might use information from the received NHC attribute as input to its construction, possibly as straightforwardly as simply copying the TLV. The details of how the characteristics in the new NHC are constructed are specific to the definition of each characteristics. Any characteristic TLVs received by S that are for characteristics not supported by S will not be included in the newly-constructed NHC attribute S includes with R.</t>
        <t>An implementation <bcp14>SHOULD</bcp14> propagate the NHC and its contained characteristics by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given characteristic is propagated. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_NHC"/>.</t>
        <t>Due to the nature of BGP optional transitive path attributes, any BGP speaker that does not implement this specification will propagate the NHC, the requirements of this section notwithstanding. Such a speaker will not update the NHC, however.</t>
        <t>Certain NLRI formats do not include a next hop at all, one example being the Flow Specification NLRI <xref target="RFC8955"/>. The NHC <bcp14>MUST NOT</bcp14> be sent with such NLRI.</t>
        <section anchor="nhcaggregation">
          <name>Aggregation</name>
          <t>When aggregating routes, the above rules for constructing a new NHC <bcp14>MUST</bcp14> be followed. The decision of whether to include the NHC with the aggregate route and what its form will be, depends in turn on whether any characteristics are eligible to be included with the aggregate route.  If there are no eligible characteristics, the NHC <bcp14>MUST NOT</bcp14> be included.</t>
          <t>The specification for an individual characteristic must define how that characteristic is to be aggregated. If no rules are defined for a given characteristic, that characteristic <bcp14>MUST NOT</bcp14> be aggregated. Rules for aggregating the ELCv3 are found in <xref target="elcv3aggregation"/>.</t>
          <t>(Route aggregation is described in <xref target="RFC4271"/>. Although prefix aggregation -- combining two or more more-specific prefixes to form one less-specific prefix -- is one application of aggregation, we note that another is when two or more routes for the same prefix are selected to be used for multipath forwarding.)</t>
        </section>
      </section>
      <section anchor="receiving">
        <name>Receiving the NHC</name>
        <t>An implementation receiving routes with a NHC <bcp14>SHOULD NOT</bcp14> discard the attribute or its contained characteristics by default. An implementation <bcp14>SHOULD</bcp14> provide configuration control of whether any given characteristic is processed. An implementation <bcp14>MAY</bcp14> provide finer-grained control on propagation based on attributes of the peering session, as discussed in <xref target="Security_NHC"/>.</t>
        <t>When a BGP speaker receives a BGP route that includes the NHC, it <bcp14>MUST</bcp14> compare the address given in the header portion of the NHC and illustrated in <xref target="nhcformat"/> to the next hop of the BGP route. If the two match, the NHC may be further processed. If the two do not match, it means some intermediate BGP speaker that handled the route in transit both does not support NHC, and changed the next hop of the route. In this case, the contents of the NHC cannot be used, and the NHC <bcp14>MUST</bcp14> be discarded without further processing, except that the contents <bcp14>MAY</bcp14> be logged.</t>
        <t>In considering whether the next hop "matches", a semantic match is sought. While bit-for-bit equality is a trivial test of matching, there may be certain cases where the two are not bit-for-bit equal, but still "match". An example is when an MP_REACH Next Hop encodes both a global and a link-local IPv6 address. In that case, the link-local address might be removed during Internal BGP (IBGP) propagation, the two would still be considered to match if they were equal on the global part. See Section 3 of <xref target="RFC2545"/>.</t>
        <t>A BGP speaker receiving a Characteristic Code that it supports behaves as defined in the document defining the Characteristic Code.  A BGP speaker receiving a Characteristic Code that it does not support <bcp14>MUST</bcp14> ignore that Characteristic Code.  In particular, the receipt of an unrecognized Characteristic Code <bcp14>MUST NOT</bcp14> be handled as an error.</t>
        <t>The presence of a characteristic <bcp14>SHOULD NOT</bcp14> influence route selection or route preference, unless tunneling is used to reach the BGP next hop, the selected route has been learned from External BGP (that is, the next hop is in a different Autonomous System), or by configuration (see following).  Indeed, it is in general impossible for a node to know that all BGP routers of the Autonomous System (AS) will understand a given characteristic, and if different routers within an AS were to use a different preference for a route, forwarding loops could result unless tunneling is used to reach the BGP next hop. Following this reasoning, if the administrator of the network is confident that all routers within the AS will interpret the presence of the characteristic in the same way, they could relax this restriction by configuration.</t>
      </section>
      <section anchor="attribute-error-handling">
        <name>Attribute Error Handling</name>
        <t>An NHC is considered malformed if the length of the attribute, encoded in the Attribute Length field of the BGP Path Attribute header (Section 4.3 of <xref target="RFC4271"/>), is inconsistent with the lengths of the contained characteristic TLVs. In other words, the sum of the sizes (Characteristic Length plus 4) of the contained characteristic TLVs, plus the length of the NHC header (<xref target="nhcformat"/>), must be equal to the overall Attribute Length.</t>
        <t>A BGP UPDATE message with a malformed NHC <bcp14>SHALL</bcp14> be handled using the approach of "attribute discard" defined in <xref target="RFC7606"/>.</t>
        <t>Unknown Characteristic Codes <bcp14>MUST NOT</bcp14> be considered to be an error.</t>
        <t>An NHC that contains no characteristic TLVs <bcp14>MAY</bcp14> be considered malformed, although it is observed that the prescribed behavior of "attribute discard" is semantically no different from that of having no TLVs to process. There is no reason to propagate an NHC that contains no characteristic TLVs.</t>
        <t>A document that specifies a new NHC Characteristic should provide specifics regarding what constitutes an error for that NHC Characteristic.</t>
        <t>If a characteristic TLV is malformed, that characteristic TLV <bcp14>SHOULD</bcp14> be ignored and removed.  Other characteristic TLVs <bcp14>SHOULD</bcp14> be processed as usual. If a given characteristic TLV requires different error-handling treatment than described in the previous sentences, its specification should provide specifics.</t>
      </section>
      <section anchor="network-operation-considerations">
        <name>Network Operation Considerations</name>
        <t>In the corner case where multiple nodes use the same IP address as their BGP next hop, such as with anycast nodes as described in <xref target="RFC4786"/>, a BGP speaker <bcp14>MUST NOT</bcp14> advertise a given characteristic unless all nodes sharing this same IP address support this characteristic. The network operator operating those anycast nodes is responsible for ensuring that an anycast node does not advertise a characteristic not supported by all nodes sharing this anycast address.  The means for accomplishing this are beyond the scope of this document.</t>
      </section>
    </section>
    <section anchor="elcv3">
      <name>Entropy Label Characteristic (ELCv3)</name>
      <t>The foregoing sections define the NHC as a container for characteristic TLVs. The Entropy Label Characteristic is one such characteristic.</t>
      <t>When BGP <xref target="RFC4271"/> is used for distributing labeled NLRI as described in, for example, <xref target="RFC8277"/>, the route may include the ELCv3 as part of the NHC.  The inclusion of this characteristic with a route indicates that the egress of the associated Label Switched Path (LSP) can process entropy labels as an egress LSR for that route -- see Section 4.1 of <xref target="RFC6790"/>. Below, we refer to this for brevity as being "EL-capable."</t>
      <t>For historical reasons, this characteristic is referred to as "ELCv3", to distinguish it from the prior Entropy Label Characteristic (ELC) defined in <xref target="RFC6790"/> and deprecated in <xref target="RFC7447"/>, and the ELCv2 described in <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <t>This section (and its subsections) replaces Section 5.2 of <xref target="RFC6790"/>, which was previously deprecated by <xref target="RFC7447"/>.</t>
      <section anchor="encoding-1">
        <name>Encoding</name>
        <t>The ELCv3 has characteristic code 1, characteristic length 0, and carries no value:</t>
        <figure>
          <name>ELCv3 TLV Format</name>
          <artwork><![CDATA[
     0                   1                   2                   3
     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |    Characteristic Code = 1    |   Characteristic Length = 0   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
      </section>
      <section anchor="sending-the-elcv3">
        <name>Sending the ELCv3</name>
        <t>When a BGP speaker S has a route R it wishes to advertise with next hop N to its peer, it <bcp14>MAY</bcp14> include the ELCv3 characteristic if it knows that the egress of the associated LSP L is EL-capable, otherwise it <bcp14>MUST NOT</bcp14> include the ELCv3 characteristic. Specific conditions where S would know that the egress is EL-capable are if S:</t>
        <ul spacing="normal">
          <li>
            <t>Is itself the egress, and knows itself to be EL-capable, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is preserving the value of N as received, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is changing the next hop that it has received to N, and knows that this new next hop (normally itself) is EL-capable, or</t>
          </li>
          <li>
            <t>Is re-advertising a BGP route it received with a valid ELCv3 characteristic, and is changing the next hop that it has received to N, and knows (for example, through configuration) that  the new next hop (normally itself) even if not EL-capable will simply swap labels without popping the BGP-advertised label stack and processing the label below, as with a transit LSR, or</t>
          </li>
          <li>
            <t>Knows by implementation-specific means that the egress is EL-capable, or</t>
          </li>
          <li>
            <t>Is redistributing a route learned from another protocol, and that other protocol conveyed the knowledge that the egress of L was EL-capable. (For example, this might be known through the Label Distribution Protocol (LDP) ELC TLV, Section 5.1 of <xref target="RFC6790"/>.)</t>
          </li>
        </ul>
        <t>The ELCv3 <bcp14>MAY</bcp14> be advertised with routes that are labeled, such as those using SAFI 4 <xref target="RFC8277"/>. It <bcp14>MUST NOT</bcp14> be advertised with unlabeled routes.</t>
        <section anchor="elcv3aggregation">
          <name>Aggregation</name>
          <t>When forming an aggregate (see <xref target="nhcaggregation"/>), the aggregate route thus formed <bcp14>MUST NOT</bcp14> include the ELCv3 unless each constituent route would be eligible to include the ELCv3 according to the criteria given above.</t>
        </section>
      </section>
      <section anchor="receiving-the-elcv3">
        <name>Receiving the ELCv3</name>
        <t>(Below, we assume that "includes the ELCv3" implies that the containing NHC has passed the checks specified in <xref target="receiving"/>. If it had not passed, then the NHC would have been discarded and the ELCv3 would be deemed not to have been included.)</t>
        <t>When a BGP speaker receives an unlabeled route that includes the ELCv3, it <bcp14>MUST</bcp14> discard the ELCv3.</t>
        <t>When a BGP speaker receives a labeled route that includes the ELCv3, it indicates that it can safely insert an entropy label into the label stack of the associated LSP. This implies that the receiving BGP speaker if acting as ingress, <bcp14>MAY</bcp14> insert an entropy label as per Section 4.2 of <xref target="RFC6790"/>.</t>
      </section>
      <section anchor="elcv3-error-handling">
        <name>ELCv3 Error Handling</name>
        <t>The ELCv3 is considered malformed and must be disregarded if its length is other than zero.</t>
        <t>If more than one instance of the ELCv3 is included in an NHC, instances beyond the first <bcp14>MUST</bcp14> be disregarded.</t>
      </section>
    </section>
    <section anchor="legacy-elc">
      <name>Legacy ELC</name>
      <t>The ELCv3 functionality introduced in this document replaces the "BGP Entropy Label Capability Attribute" (ELC attribute) that was introduced by <xref target="RFC6790"/>, and deprecated by <xref target="RFC7447"/>. The latter RFC specifies that the ELC attribute, BGP path attribute 28, "<bcp14>MUST</bcp14> be treated as any other unrecognized optional, transitive attribute". This specification revises that requirement.</t>
      <t>As the current specification was developed, it became clear that due to incompatibilities between how the ELC attribute is processed by different fielded implementations, the most prudent handling of attribute 28 is not to propagate it as an unrecognized optional, transitive attribute, but to discard it. Therefore, this specification updates <xref target="RFC7447"/>, by instead requiring that an implementation that receives the ELC attribute <bcp14>MUST</bcp14> discard any received ELC attribute.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>IANA has made a temporary allocation in the BGP Path Attributes registry of the Border Gateway Protocol (BGP) Parameters group. IANA is requested to make this allocation permanent, and to update its name and reference as shown below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Code</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">39</td>
            <td align="left">BGP Next Hop Dependent Characteristic (NHC)</td>
            <td align="left">(this doc)</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to create a new registry called "BGP Next Hop Dependent Characteristic Codes" within the Border Gateway Protocol (BGP) Parameters group. The registry's allocation policy is First Come, First Served, except where designated otherwise in <xref target="preregistry"/>. It is seeded with the following values:</t>
      <table anchor="preregistry">
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
            <th align="left">Change Controller</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">ELCv3</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">NNHN</td>
            <td align="left">draft-wang-idr-next-next-hop-nodes-01</td>
            <td align="left">kfwang@juniper.net</td>
          </tr>
          <tr>
            <td align="left">65400 - 65499</td>
            <td align="left">private use</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65500 - 65534</td>
            <td align="left">reserved for experimental use</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
          <tr>
            <td align="left">65535</td>
            <td align="left">reserved</td>
            <td align="left">(this doc)</td>
            <td align="left">IETF</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="Security_NHC">
        <name>Considerations for the NHC</name>
        <t>The header portion of the NHC contains the next hop the attribute's originator included when sending it, or that an intermediate router included when updating the attribute (in the latter case, the "contract" with the intermediate router is that it performed the checks in <xref target="receiving"/> before propagating the attribute). This will typically be an IP address of the router in question. This may be an infrastructure address the network operator does not intend to announce beyond the border of its Autonomous System, and it may even be considered in some weak sense, confidential information.</t>
        <t>A motivating application for this attribute is to convey information between Autonomous Systems that are under the control of the same administrator. In such a case, it would not need to be sent to other Autonomous Systems. At time of writing, work <xref target="I-D.uttaro-idr-bgp-oad"/> is underway to standardize a method of distinguishing between the two categories of external Autonomous Systems, and if such a distinction is available, an implementation can take advantage of it by constraining the NHC and its contained characteristic to only propagate by default to and from the former category of Autonomous Systems. If such a distinction is not available, a network operator may prefer to configure routers peering with Autonomous Systems not under their administrative control to not send or accept the NHC or its contained characteristic, unless there is an identified need to do so.</t>
        <t>The foregoing notwithstanding, control of NHC propagation can't be guaranteed in all cases -- if a border router doesn't implement this specification, the attribute, like all BGP optional transitive attributes, will propagate to neighboring Autonomous Systems. (This can be seen as a specific case of the general "attribute escape" phenomenon discussed in <xref target="I-D.haas-idr-bgp-attribute-escape"/>.) Similarly, if a border router receiving the attribute from an external Autonomous System doesn't implement this specification, it will store and propagate the attribute, the requirements of <xref target="receiving"/> notwithstanding. So, sometimes this information could leak beyond its intended scope. (Note that it will only propagate as far as the first router that does support this specification, at which point it will typically be discarded due to a non-matching next hop, per <xref target="receiving"/>.)</t>
        <t>If the attribute leaks beyond its intended scope, characteristics within it would potentially be exposed.  Specifications for individual characteristics should consider the consequences of such unintended exposure, and should identify any necessary constraints on propagation.</t>
      </section>
      <section anchor="considerations-for-the-elcv3-characteristic">
        <name>Considerations for the ELCv3 Characteristic</name>
        <t>Insertion of an ELCv3 by an attacker could cause forwarding to fail. Deletion of an ELCv3 by an attacker could cause one path in the network to be overutilized and another to be underutilized. However, we note that an attacker able to accomplish either of these (below, an "on-path attacker") could equally insert or remove any other BGP path attribute or message. The former attack described above denies service for a given route, which can be accomplished by an on-path attacker in any number of ways even absent ELCv3. The latter attack defeats an optimization but nothing more; it seems dubious that an attacker would go to the trouble of doing so rather than launching some more damaging attack.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2545">
          <front>
            <title>Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing</title>
            <author fullname="P. Marques" initials="P." surname="Marques"/>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <date month="March" year="1999"/>
            <abstract>
              <t>BGP-4 Multiprotocol Extensions (BGP-MP) defines the format of two BGP attributes (MP_REACH_NLRI and MP_UNREACH_NLRI) that can be used to announce and withdraw the announcement of reachability information. This document defines how compliant systems should make use of those attributes for the purpose of conveying IPv6 routing information. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2545"/>
          <seriesInfo name="DOI" value="10.17487/RFC2545"/>
        </reference>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC6790">
          <front>
            <title>The Use of Entropy Labels in MPLS Forwarding</title>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="L. Yong" initials="L." surname="Yong"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>Load balancing is a powerful tool for engineering traffic across a network. This memo suggests ways of improving load balancing across MPLS networks using the concept of "entropy labels". It defines the concept, describes why entropy labels are useful, enumerates properties of entropy labels that allow maximal benefit, and shows how they can be signaled and used for various applications. This document updates RFCs 3031, 3107, 3209, and 5036. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6790"/>
          <seriesInfo name="DOI" value="10.17487/RFC6790"/>
        </reference>
        <reference anchor="RFC7447">
          <front>
            <title>Deprecation of BGP Entropy Label Capability Attribute</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The BGP Entropy Label Capability attribute is defined in RFC 6790. Regrettably, it has a bug: although RFC 6790 mandates that routers incapable of processing Entropy Labels must remove the attribute, fulfillment of this requirement cannot be guaranteed in practice. This specification deprecates the attribute. A forthcoming document will propose a replacement.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7447"/>
          <seriesInfo name="DOI" value="10.17487/RFC7447"/>
        </reference>
        <reference anchor="RFC7606">
          <front>
            <title>Revised Error Handling for BGP UPDATE Messages</title>
            <author fullname="E. Chen" initials="E." role="editor" surname="Chen"/>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session. This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes. Finally, it revises the error handling procedures for a number of existing attributes.</t>
              <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7606"/>
          <seriesInfo name="DOI" value="10.17487/RFC7606"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9012">
          <front>
            <title>The BGP Tunnel Encapsulation Attribute</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="S. Sangli" initials="S." surname="Sangli"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <date month="April" year="2021"/>
            <abstract>
              <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
              <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9012"/>
          <seriesInfo name="DOI" value="10.17487/RFC9012"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.haas-idr-bgp-attribute-escape">
          <front>
            <title>BGP Attribute Escape</title>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <date day="20" month="September" year="2024"/>
            <abstract>
              <t>   BGP-4 [RFC 4271] has been very successful in being extended over the
   years it has been deployed.  A significant part of that success is
   due to its ability to incrementally add new features to its Path
   Attributes when they are marked "optional transitive".
   Implementations that are ignorant of a feature for an unknown Path
   Attribute that are so marked will propagate BGP routes with such
   attributes.

   Unfortunately, this blind propagation of unknown Path Attributes may
   happen for features that are intended to be used in a limited scope.
   When such Path Attributes inadvertently are carried beyond that
   scope, it can lead to things such as unintended disclosure of
   sensitive information, or cause improper routing.  In their worst
   cases, such propagation may be for malformed Path Attributes and lead
   to BGP session resets or crashes.

   This document calls such inadvertent propagation of BGP Path
   Attributes, "attribute escape".  This document further describes some
   of the scenarios that leads to this behavior and makes
   recommendations on practices that may limit its impact.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-haas-idr-bgp-attribute-escape-02"/>
        </reference>
        <reference anchor="I-D.ietf-idr-next-hop-capability">
          <front>
            <title>BGP Next-Hop dependent capabilities</title>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
              <organization>Nokia</organization>
            </author>
            <date day="8" month="June" year="2022"/>
            <abstract>
              <t>   RFC 5492 advertises the capabilities of the BGP peer.  When the BGP
   peer is not the same as the BGP Next-Hop, it is useful to also be
   able to advertise the capability of the BGP Next-Hop, in particular
   to advertise forwarding plane features.  This document defines a
   mechanism to advertise such BGP Next Hop dependent Capabilities.

   This document defines a new BGP non-transitive attribute to carry
   Next-Hop Capabilities.  This attribute is guaranteed to be deleted or
   updated when the BGP Next Hop is changed, in order to reflect the
   capabilities of the new BGP Next-Hop.

   This document also defines a Next-Hop capability to advertise the
   ability to process the MPLS Entropy Label as an egress LSR for all
   NLRI advertised in the BGP UPDATE.  It updates RFC 6790 with regard
   to this BGP signaling.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-next-hop-capability-08"/>
        </reference>
        <reference anchor="I-D.scudder-bgp-entropy-label">
          <front>
            <title>BGP Entropy Label Capability, Version 2</title>
            <author fullname="John Scudder" initials="J." surname="Scudder">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Kireeti Kompella" initials="K." surname="Kompella">
              <organization>Juniper Networks</organization>
            </author>
            <date day="28" month="April" year="2022"/>
            <abstract>
              <t>   RFC 6790 defined the Entropy Label Capability Attribute (ELC); RFC
   7447 deprecated that attribute.  This specification, dubbed "Entropy
   Label Capability Attribute version 2" (ELCv2), was intended to be
   offered for standardization, to replace the ELC as a way to signal
   that a BGP protocol speaker is capable of processing entropy labels.

   Although ultimately a different specification was chosen for that
   purpose, at least one implementation of ELCv2 was shipped by Juniper
   Networks and is currently in use in service provider networks.  This
   document is published in order to document what was implemented.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-scudder-bgp-entropy-label-00"/>
        </reference>
        <reference anchor="I-D.uttaro-idr-bgp-oad">
          <front>
            <title>One Administrative Domain using BGP</title>
            <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
              <organization>Individual Contributor</organization>
            </author>
            <author fullname="Alvaro Retana" initials="A." surname="Retana">
              <organization>Futurewei Technologies, Inc.</organization>
            </author>
            <author fullname="Pradosh Mohapatra" initials="P." surname="Mohapatra">
              <organization>Google</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc.</organization>
            </author>
            <author fullname="Bin Wen" initials="B." surname="Wen">
              <organization>Comcast</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a new External BGP (EBGP) peering type known as
   EBGP-OAD, which is used between two EBGP peers that belong to One
   Administrative Domain (OAD).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-uttaro-idr-bgp-oad-04"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC5492">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
      </references>
    </references>
    <?line 327?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors of this specification thank Randy Bush, Mach Chen, Wes Hardaker, Jeff Haas, Susan Hares, Ketan Talaulikar, and Gyan Mishra for their review and comments.</t>
      <t>This specification derives from two earlier documents, <xref target="I-D.ietf-idr-next-hop-capability"/> and <xref target="I-D.scudder-bgp-entropy-label"/>.</t>
      <t><xref target="I-D.ietf-idr-next-hop-capability"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    The Entropy Label Next-Hop Capability defined in this document is
    based on the ELC BGP attribute defined in section 5.2 of [RFC6790].

    The authors wish to thank John Scudder for the discussions on this
    topic and Eric Rosen for his in-depth review of this document.

    The authors wish to thank Jie Dong and Robert Raszuk for their
    review and comments.
]]></artwork>
      <t><xref target="I-D.scudder-bgp-entropy-label"/> included the following acknowledgements:</t>
      <artwork><![CDATA[
    Thanks to Swadesh Agrawal, Alia Atlas, Bruno Decraene, Martin
    Djernaes, John Drake, Adrian Farrell, Keyur Patel, Toby Rees, and
    Ravi Singh, for their discussion of this issue. 
]]></artwork>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Krier" fullname="Serge Krier">
        <organization>Cisco Systems</organization>
        <address>
          <email>sekrier@cisco.com</email>
        </address>
      </contact>
      <contact initials="K." surname="Wang" fullname="Kevin Wang">
        <organization>Juniper Networks</organization>
        <address>
          <email>kfwang@juniper.net</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
