<?xml version="1.0" encoding="iso-8859-1"?>
<?rfc toc="yes"?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>

<rfc category="std" ipr="trust200902" docName="draft-ietf-ippm-ioam-conf-state-06" consensus="true" submissionType="IETF">

<front>
  <title abbrev="Ping Enabled IOAM Capabilities"> Echo Request/Reply for Enabled In-situ OAM Capabilities </title>

  <author fullname="Xiao Min" initials="X" surname="Min">
      <organization>ZTE Corp.</organization>
     <address>
       <postal>
         <street></street>

         <!-- Reorder these if your country does things differently -->

         <city>Nanjing</city>

         <region></region>

         <code></code>

         <country>China</country>
       </postal>

       <phone>+86 25 88013062</phone>

       <email>xiao.min2@zte.com.cn</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

  <author fullname="Greg Mirsky" initials="G" surname="Mirsky">
      <organization>Ericsson</organization>
     <address>
       <postal>
         <street></street>

         <!-- Reorder these if your country does things differently -->

         <city></city>

         <region></region>

         <code></code>

         <country>United States of America</country>
       </postal>

       <phone></phone>

       <email>gregimirsky@gmail.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

  <author fullname="Lei Bo" initials="L" surname="Bo">
      <organization>China Telecom</organization>
     <address>
       <postal>
         <street></street>

         <!-- Reorder these if your country does things differently -->

         <city>Beijing</city>

         <region></region>

         <code></code>

         <country>China</country>
       </postal>

       <phone>+86 10 50902903</phone>

       <email>leibo@chinatelecom.cn</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>

    <date year="2022"/>
	
    <area>Transport</area>
    <workgroup>IPPM Working Group</workgroup>

    <keyword>Request for Comments</keyword>
    <keyword>RFC</keyword>
    <keyword>Internet Draft</keyword>
    <keyword>I-D</keyword>

    <abstract>
  <t> This document describes an extension to the echo request/reply mechanisms used in IPv6 (including Segment Routing with IPv6 data 
  plane (SRv6)), MPLS (including Segment Routing with MPLS data plane (SR-MPLS)), Service Function Chain (SFC) and Bit Index Explicit 
  Replication (BIER) environments, which can be used within the In situ Operations, Administration, and Maintenance (IOAM) domain, 
  allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of each IOAM transit and IOAM decapsulating node.</t>
    </abstract>
    
</front>
  
<middle>

  <section title="Introduction">

  <t> In situ Operations, Administration, and Maintenance (IOAM) (<xref target="RFC9197"/> <xref target="I-D.ietf-ippm-ioam-direct-export"/>) 
  defines data fields that record OAM information within the packet while the packet traverses a particular network domain, called an IOAM 
  domain. IOAM can complement or replace other OAM mechanisms, such as ICMP or other types of probe packets.</t>

  <t> As specified in <xref target="RFC9197"/>, within the IOAM domain, the IOAM data may be updated by network nodes that
  the packet traverses.  The device which adds an IOAM header to the packet is called an "IOAM encapsulating node". In contrast, the device 
  which removes an IOAM header is referred to as an "IOAM decapsulating node".  Nodes within the domain that are aware of IOAM data and 
  read and/or write and/or process IOAM data are called "IOAM transit nodes". IOAM encapsulating or decapsulating nodes can also serve as IOAM 
  transit nodes at the same time. IOAM encapsulating or decapsulating nodes are also referred to as IOAM domain edge devices, which can be 
  hosts or network devices.</t>

  <t> As specified in <xref target="RFC9197"/>, IOAM is focused on "limited domains" as defined in <xref target="RFC8799"/>. 
  In a limited domain, a control entity that has control over every IOAM device may be deployed. If that's the case, the control entity can 
  provision both the explicit transport path and the IOAM header applied to data packet at every IOAM encapsulating node.</t>
  
  <t> In a case when a control entity that has control over every IOAM device is not deployed in the IOAM domain, the IOAM encapsulating node 
  needs to discover the enabled IOAM capabilities at the IOAM transit and decapsulating nodes. For example, what types of IOAM tracing data can 
  be added by the transit nodes along the transport path of the data packet IOAM is applied to. The IOAM encapsulating node can then add the 
  correct IOAM header to the data packet according to the discovered IOAM capabilities. Specifically, the IOAM encapsulating node first identifies 
  the types and lengths of IOAM options included in the IOAM data according to the discovered IOAM capabilities. Then the IOAM encapsulating node 
  can add the IOAM header to the data packet based on the identified types and lengths of IOAM options included in the IOAM data. The IOAM 
  encapsulating node may use NETCONF/YANG or IGP to discover these IOAM capabilities. However, NETCONF/YANG or IGP has some limitations:
  
    <list style="symbols">
    <t>
    When NETCONF/YANG is used in this scenario, each IOAM encapsulating node (including the host when it takes the role of an IOAM encapsulating 
	node) needs to implement a NETCONF Client, each IOAM transit and IOAM decapsulating node (including the host when it takes the role of an 
	IOAM decapsulating node) needs to implement a NETCONF Server, the complexity can be an issue. Furthermore, each IOAM encapsulating node 
	needs to establish NETCONF Connection with each IOAM transit and IOAM decapsulating node, the scalability can be an issue.
    </t>
    <t>
    When IGP is used in this scenario, the IGP and IOAM domains don't always have the same coverage. For example, when the IOAM encapsulating node 
	or the IOAM decapsulating node is a host, the availability can be an issue. Furthermore, it might be too challenging to reflect enabled IOAM 
	capabilities at the IOAM transit and IOAM decapsulating node if these are controlled by a local policy depending on the identity of the 
	IOAM encapsulating node.
    </t>
    </list>
	
  </t>
  
  <t> This document describes an extension to the echo request/reply mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS), SFC and 
  BIER environments, which can be used within the IOAM domain, allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of 
  each IOAM transit and IOAM decapsulating node.</t>
  
  <t> The following documents contain references to the echo request/reply mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS), SFC 
  and BIER environments:
    <list style="symbols">
    <t>
    <xref target="RFC4443"/> ("Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification"), 
	<xref target="RFC4620"/> ("IPv6 Node Information Queries"), 
	<xref target="RFC4884"/> ("Extended ICMP to Support Multi-Part Messages") and 
	<xref target="RFC8335"/> ("PROBE: A Utility for Probing Interfaces")
    </t>
    <t>
    <xref target="RFC8029"/> ("Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures")
    </t>
    <t>
    <xref target="I-D.ietf-sfc-multi-layer-oam"/> ("Active OAM for Service Function Chaining (SFC)")
    </t>
    <t>
    <xref target="I-D.ietf-bier-ping"/> ("BIER Ping and Trace")
    </t>
    </list>	
  </t>
  
  <t> Note that specification details for these different echo request/reply protocols are outside the scope of this document. It is expected that 
  each such protocol extension would be specified by an RFC and jointly designed by the working group that develops or maintains the echo request/reply 
  protocol and the IETF IP Performance Measurement (IPPM) Working Group.</t>
	 
  <t> Fate sharing is a common requirement for all kinds of active OAM packets, echo request is among them, in this document that means echo request 
  is required to traverse a path of IOAM data packet. This requirement can be achieved by, e.g., applying same explicit path or ECMP processing to both 
  echo request and IOAM data packet.</t>
       
  </section>
  
   <section title="Conventions">

    <section title="Requirements Language">
	<t> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
	"MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
	when, and only when, they appear in all capitals, as shown here.</t>
    </section>
   
    <section title="Abbreviations">
    <t> BIER: Bit Index Explicit Replication</t>
    <t> BGP: Border Gateway Protocol</t>
    <t> ECMP: Equal-Cost Multipath</t>
    <t> E2E: Edge to Edge</t>
    <t> ICMP: Internet Control Message Protocol</t>
    <t> IGP: Interior Gateway Protocol</t>
    <t> IOAM: In situ Operations, Administration, and Maintenance</t>
    <t> LSP: Label Switched Path</t>
    <t> MPLS: Multi-Protocol Label Switching</t>
	<t> MTU: Maximum Transmission Unit</t>
    <t> NTP: Network Time Protocol</t>
    <t> OAM: Operations, Administration, and Maintenance</t>
    <t> PCEP: Path Computation Element (PCE) Communication Protocol</t>
    <t> POSIX: Portable Operating System Interface</t>	
    <t> POT: Proof of Transit</t>
    <t> PTP: Precision Time Protocol</t>
    <t> SR-MPLS: Segment Routing with MPLS data plane</t>
    <t> SRv6: Segment Routing with IPv6 data plane</t>
    <t> SFC: Service Function Chain</t>
    <t> TTL: Time to Live</t>	
    </section>
	
   </section>

  <section title="IOAM Capabilities Formats">

    <section title="IOAM Capabilities Query Container">

	<t> For echo request, IOAM Capabilities Query uses a container which has the following format:</t>
	 
     <figure anchor="Figure_1" title="IOAM Capabilities Query Container of Echo Request">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.            IOAM Capabilities Query Container Header           .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.                   List of IOAM Namespace-IDs                  .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this container is present in the echo request sent by an IOAM encapsulating node, that means the IOAM encapsulating node 
	 requests the receiving node to reply with its enabled IOAM capabilities. If there is no IOAM capability to be reported by the receiving 
	 node, then this container SHOULD be ignored by the receiving node, which means the receiving node SHOULD send an echo reply without IOAM 
	 capabilities or no echo reply, in the light of whether the echo request includes other containers than the IOAM Capabilities Query Container. 
	 A list of IOAM Namespace-IDs (one or more Namespace-IDs) MUST be included in this container in the echo request, and if present, the Default-Namespace-ID 
	 0x0000 MUST be placed at the begining of the list of IOAM Namespace-IDs. The IOAM encapsulating node requests only the enabled IOAM capabilities 
	 that match one of the Namespace-IDs. The Namespace-ID has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>.</t> 
	 
     <t> The IOAM Capabilities Query Container has a container header that is used to identify the type and optionally length of the container payload, 
	 and the container payload (List of IOAM Namespace-IDs) is zero-padded to align to a 4-octet boundary.</t>	
	 
     <t> The length, structure, and definition of the IOAM Capabilities Query Container Header depends on the specific environment it is applied at.</t>	
	 
	</section> 
   
    <section title="IOAM Capabilities Response Container">

	<t> For echo reply, IOAM Capabilities Response uses a container which has the following format:</t>
	 
     <figure anchor="Figure_2" title="IOAM Capabilities Response Container of Echo Reply">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.          IOAM Capabilities Response Container Header          .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.               List of IOAM Capabilities Objects               .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>

     <t> When this container is present in the echo reply sent by an IOAM transit node or IOAM decapsulating node, that means the IOAM function 
	 is enabled at this node, and this container contains the enabled IOAM capabilities of the sender. A list of IOAM capabilities objects (one 
	 or more objects) which contains the enabled IOAM capabilities SHOULD be included in this container of echo reply.</t>
	 
     <t> The IOAM Capabilities Response Container has a container header that is used to identify the type and optionally length of the container payload, 
	 and the container payload (List of IOAM Capabilities Objects) is zero-padded to align to a 4-octet boundary.</t>	
	 
     <t> The length, structure, and definition of the IOAM Capabilities Response Container Header depends on the specific environment it is applied at.</t>	
	 
     <t> Based on the IOAM data fields defined in <xref target="RFC9197"/> and <xref target="I-D.ietf-ippm-ioam-direct-export"/>, 
	 six types of objects are defined in this document. The same type of object MAY be present in the IOAM Capabilities Response Container more than 
	 once, only if with a different Namespace-ID.</t>
	 
     <t> Similar to the container, each object has an object header that is used to identify the type and length of the object payload, and the object payload 
	 is zero-padded to align to a 4-octet boundary.</t>
	 
     <t> The length, structure, and definition of Object Header depends on the specific environment it is applied at.</t>	
	 
	<section title="IOAM Pre-allocated Tracing Capabilities Object">
		 
     <figure anchor="Figure_3" title="IOAM Pre-allocated Tracing Capabilities Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.     IOAM Pre-allocated Tracing Capabilities Object Header     .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |  Reserved   |W|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |          Ingress_MTU          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Ingress_if_id (short or wide format)         ......          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM transit node and the IOAM 
	 pre-allocated tracing function is enabled at this IOAM transit node.</t>
	 
     <t> IOAM-Trace-Type field has the same definition as what's specified in Section 4.4 of <xref target="RFC9197"/>.</t>
	 
     <t> Reserved field is reserved for future use and MUST be set to zero.</t>
	 
     <t> W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. 
	 The W-bit is clear if the Ingress_if_id is in short format.</t>

     <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it should
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
	 
     <t> Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received echo 
	 request.</t>
	 
     <t> Ingress_if_id field has 16 bits (in short format) or 32 bits (in wide format) and specifies the identifier of the ingress interface
	 from which the sending node received echo request. If the W-bit is cleared that indicates Ingress_if_id field has 16 bits, then the 16 bits 
	 following the Ingress_if_id field are reserved for future use and MUST be set to zero.</t>
	 
    </section>
	 
	<section title="IOAM Incremental Tracing Capabilities Object">
		 
     <figure anchor="Figure_4" title="IOAM Incremental Tracing Capabilities Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.      IOAM Incremental Tracing Capabilities Object Header      .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |  Reserved   |W|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |          Ingress_MTU          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Ingress_if_id (short or wide format)         ......          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM transit node and the IOAM 
	 incremental tracing function is enabled at this IOAM transit node.</t> 
	 
     <t> IOAM-Trace-Type field has the same definition as what's specified in Section 4.4 of <xref target="RFC9197"/>.</t>

     <t> Reserved field is reserved for future use and MUST be set to zero.</t>
	 
     <t> W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. 
	 The W-bit is clear if the Ingress_if_id is in short format.</t>
	 
     <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it should
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
	 
     <t> Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received echo 
	 request.</t>
	 
     <t> Ingress_if_id field has 16 bits (in short format) or 32 bits (in wide format) and specifies the identifier of the ingress interface
	 from which the sending node received echo request. If the W-bit is cleared that indicates Ingress_if_id field has 16 bits, then the 16 bits 
	 following the Ingress_if_id field are reserved for future use and MUST be set to zero.</t>
	 
    </section>
	 	 
    <section title="IOAM Proof-of-Transit Capabilities Object">
		 
     <figure anchor="Figure_5" title="IOAM Proof-of-Transit Capabilities Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.       IOAM Proof-of-Transit Capabilities Object Header        .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          | IOAM-POT-Type |SoP| Reserved  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM transit node and the IOAM 
	 Proof of Transit function is enabled at this IOAM transit node.</t> 
	 
     <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it should
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
	 
     <t> IOAM-POT-Type field has the same definition as what's specified in Section 4.5 of <xref target="RFC9197"/>.</t>
	 
     <t> SoP field has two bits, which means the size of "PktID" and "Cumulative" data that are specified in Section 4.5 of <xref target=
	 "RFC9197"/>. This document defines SoP as follow:
	 <list>	
     <t> 0b00 means 64-bit "PktID" and 64-bit "Cumulative" data.</t>
	 <t> 0b01~0b11: Reserved for future standardization</t>
	 </list>
	 </t>
     <t> Reserved field is reserved for future use and MUST be set to zero.</t>

    </section>
	
    <section title="IOAM Edge-to-Edge Capabilities Object">
		 
     <figure anchor="Figure_6" title="IOAM Edge-to-Edge Capabilities Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.          IOAM Edge-to-Edge Capabilities Object Header         .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |         IOAM-E2E-Type         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|TSF|         Reserved          |           Reserved            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM decapsulating node and 
	 IOAM edge-to-edge function is enabled at this IOAM decapsulating node.</t> 

	 <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it should
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
	 
     <t> IOAM-E2E-Type field has the same definition as what's specified in Section 4.6 of <xref target="RFC9197"/>.</t>
	 
     <t> TSF field specifies the timestamp format used by the sending node. Aligned with three possible timestamp formats specified in Section 5 
	 of <xref target="RFC9197"/>, this document defines TSF as follows:
	 <list>	
	 <t> 0b00: PTP truncated timestamp format</t>
	 <t> 0b01: NTP 64-bit timestamp format</t>
	 <t> 0b10: POSIX-based timestamp format</t>
	 <t> 0b11: Reserved for future standardization</t>
	 </list>
	 </t>
	 
     <t> Reserved field is reserved for future use and MUST be set to zero.</t>

    </section> 
	
	<section title="IOAM DEX Capabilities Object">
		 
     <figure anchor="Figure_7" title="IOAM DEX Capabilities Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.              IOAM DEX Capabilities Object Header              .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IOAM-Trace-Type                 |    Reserved   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |           Reserved            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM transit node and the IOAM 
	 direct exporting function is enabled at this IOAM transit node.</t> 
	 
     <t> IOAM-Trace-Type field has the same definition as what's specified in Section 3.2 of <xref target="I-D.ietf-ippm-ioam-direct-export"/>.</t>

     <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it should 
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t>
	 
     <t> Reserved field is reserved for future use and MUST be set to zero.</t>
	 
    </section>	
	
	<section title="IOAM End-of-Domain Object">
		 
     <figure anchor="Figure_8" title="IOAM End-of-Domain Object">
     <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.                                                               .
.               IOAM End-of-Domain Object Header                .
.                                                               .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Namespace-ID          |          Must Be Zero         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     ]]></artwork>
     </figure>
        
     <t> When this Object is present in the IOAM Capabilities Response Container, that means the sending node is an IOAM decapsulating node. 
	 Unless the IOAM Edge-to-Edge Capabilities Object is present, which also indicates that the sending node is an IOAM 
	 decapsulating node, the End-of-Domain Object MUST be present in the IOAM Capabilities Response Container sent by an IOAM decapsulating node. 
	 When the IOAM edge-to-edge function is enabled at the IOAM decapsulating node, it's RECOMMENDED to include only the IOAM Edge-to-Edge 
	 Capabilities Object but not the IOAM End-of-Domain Object.</t> 

	 <t> Namespace-ID field has the same definition as what's specified in Section 4.3 of <xref target="RFC9197"/>, it SHOULD
	 be one of the Namespace-IDs listed in the IOAM Capabilities Query Container.</t>
	 
    </section> 
	
   </section> 
  </section> 

  <section title="Operational Guide"> 
  
  <t> Once the IOAM encapsulating node is triggered to discover the enabled IOAM capabilities of each IOAM transit and IOAM decapsulating 
  node, the IOAM encapsulating node will send echo requests that include the IOAM Capabilities Query Container. First, with TTL equal to 1 to reach the 
  closest node, which may be an IOAM transit node or not. Then with TTL equal to 2 to reach the second nearest node, which also may be an IOAM 
  transit node or not. And further, increasing by 1 the TTL every time the IOAM encapsulating node sends a new echo request, until the IOAM 
  encapsulating node receives an echo reply sent by the IOAM decapsulating node, which should contain the IOAM Capabilities Response Container
  including the IOAM Edge-to-Edge Capabilities Object or the IOAM End-of-Domain Object. Alternatively, if the IOAM encapsulating node knows
  precisely all the IOAM transit and IOAM decapsulating nodes beforehand, once the IOAM encapsulating node is triggered to discover the 
  enabled IOAM capabilities, it can send an echo request to each IOAM transit and IOAM decapsulating node directly, without TTL 
  expiration.</t>
  
  <t> The IOAM encapsulating node may be triggered by the device administrator, the network management system, the network controller, or
  data traffic. The specific triggering mechanisms are outside the scope of this document.</t>
  
  <t> Each IOAM transit and IOAM decapsulating node that receives an echo request containing the IOAM Capabilities Query Container will send an
  echo reply to the IOAM encapsulating node. For the echo reply, there should be an IOAM Capabilities Response Container containing one or more
  Objects. The IOAM Capabilities Query Container of the echo request would be ignored by the receiving node unaware of IOAM.</t>
  
  </section>

  <section title="IANA Considerations"> 
  <t> This document requests the following IANA Actions.</t>
  
  <t> IANA is requested to create a registry group named "In-Situ OAM (IOAM) Capabilities Parameters".</t>

  <t> This group will include the following registries:</t>
  
       <t><list style="symbols">
           <t>IOAM SoP Capability</t>
           <t>IOAM TSF Capability</t>
       </list></t>
  
  <t> New registries in this group can be created via RFC Required process as per <xref target="RFC8126"/>.</t>
  
  <t> The subsequent sub-sections detail the registries herein contained.</t>
  
  <t> Considering the Containers/Objects defined in this document would be carried in different types of Echo Request/Reply messages, such as 
  ICMPv6 or LSP Ping, it is intended that the registries for Container/Object Type would be requested in subsequent documents.</t>
  
  <section title="IOAM SoP Capability Registry">
    <t> This registry defines 4 code points for the IOAM SoP Capability field for identifying the size of "PktID" and "Cumulative" data 
	as explained in Section 4.5 of <xref target="RFC9197"/>. The following code points are defined in this document:</t>
	
        <figure>
          <artwork><![CDATA[
   SoP        Description
   ----       -----------
   0b00       64-bit "PktID" and 64-bit "Cumulative" data
        ]]></artwork>
        </figure>

    <t> 0b01 - 0b11 are available for assignment via RFC Required process as per <xref target="RFC8126"/>.</t>
  </section>
  
  <section title="IOAM TSF Capability Registry">
    <t> This registry defines 4 code points for the IOAM TSF Capability field of identifying the timestamp format as explained in Section 
	5 of <xref target="RFC9197"/>. The following code points are defined in this document:</t>
	
        <figure>
          <artwork><![CDATA[
   TSF        Description
   ----       -----------
   0b00       PTP Truncated Timestamp Format
   0b01       NTP 64-bit Timestamp Format
   0b10       POSIX-based Timestamp Format
   0b11       Reserved for future standardization
        ]]></artwork>
        </figure>
		
    <t> 0b11 is available for assignment via RFC Required process as per <xref target="RFC8126"/>.</t>
  </section>
  
  </section>
  
  <section title="Security Considerations">
  
  <t> Overall, the security needs for IOAM capabilities query mechanisms used in different environments are similar.</t>
  
  <t> To avoid potential Denial-of-Service (DoS) attacks, it is RECOMMENDED that implementations apply rate-limiting to 
  incoming echo requests and replies.</t>
  
  <t> To protect against unauthorized sources using echo request messages to obtain IOAM Capabilities information, it is 
  RECOMMENDED that implementations provide a means of checking the source addresses of echo request messages against an 
  access list before accepting the message.</t>
  
  <t> A deployment can increase security by using border filtering of incoming and outgoing echo requests/replies.</t>
  
  <t> The integrity protection on IOAM Capabilities information carried in echo reply messages can be achieved by the 
  underlying transport. For example, if the environment is an IPv6 network, the IP Authentication Header 
  <xref target="RFC4302"/> or IP Encapsulating Security Payload Header <xref target="RFC4303"/> can be used.</t>
  
  <t> The collected IOAM Capabilities information by queries may be considered confidential. An implementation can use 
  secure underlying transport of echo request/reply to provide privacy protection. For example, if the environment is 
  an IPv6 network, confidentiality can be achieved by using the IP Encapsulating Security Payload Header <xref target="RFC4303"/>.</t>
  
  <t> An implementation can also directly secure the data carried in echo requests and replies if needed, the specific 
  mechanism on how to secure the data is beyond the scope of this document.</t>
  
  <t> An implementation can also check whether the fields in received echo requests and replies strictly conform to the 
  specifications, e.g., whether all the reserved fields are set to zero, whether the list of IOAM Namespace-IDs includes 
  duplicate entries, whether the received Namespace-ID is an operator-assigned or IANA-assigned one, once a check fails, 
  an exception event indicating the checked field should be reported to the management.</t>
  
  <t> Except for what's described above, the securiy issues discussed in <xref target="RFC9197"/> provide a good guidance on 
  implementation of this specification.</t>
  
  </section>
  
  <section title="Acknowledgements">
  
  <t> The authors would like to acknowledge Tianran Zhou, Dhruv Dhody, Frank Brockners, Cheng Li, Gyan Mishra, Marcus 
  Ihlar, Martin Duke and Chris Lonvick for their careful review and helpful comments.</t>
  <t> The authors appreciate the f2f discussion with Frank Brockners on this document.</t>
  <t> The authors would like to acknowledge Tommy Pauly and Ian Swett for their good suggestion and guidance.</t>
  
  </section>  
  
</middle>
  
<back>

    <references title="Normative References">
     <?rfc include="reference.RFC.2119"?>
     <?rfc include="reference.RFC.8174"?>
     <?rfc include="reference.RFC.8126"?>
     <?rfc include="reference.RFC.9197"?>
     <?rfc include="reference.I-D.ietf-ippm-ioam-direct-export"?>	
    </references>
	
	<references title="Informative References">
     <?rfc include="reference.RFC.8799"?>
     <?rfc include="reference.RFC.4443"?>
     <?rfc include="reference.RFC.4620"?>
     <?rfc include="reference.RFC.4884"?>
     <?rfc include="reference.RFC.8335"?>
     <?rfc include="reference.RFC.8029"?>
     <?rfc include="reference.RFC.4302"?>
     <?rfc include="reference.RFC.4303"?>
     <?rfc include="reference.I-D.ietf-sfc-multi-layer-oam"?>
     <?rfc include="reference.I-D.ietf-bier-ping"?>
    </references>
	
</back>
</rfc>

