<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info"
     docName="draft-li-rtgwg-gip6-protocol-ext-requirements-03"
     ipr="trust200902">
  <front>
    <title abbrev="Protocol Extension Requirements of GIP6">Scenarios and
    Protocol Extension Requirements of a Generalized IPv6 Tunnel</title>

    <author fullname="Xinxin Yi" initials="X." surname="Yi">
      <organization>China Unicom</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing,100048</city>

          <country>China</country>
        </postal>

        <email>yixx3@chinaunicom.cn</email>
      </address>
    </author>

    <author fullname=" Zhenbin Li" initials="Z." surname="Li">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing,100095</city>

          <country>China</country>
        </postal>

        <email>lizhenbin@huawei.com</email>
      </address>
    </author>

    <author fullname="Qiangzhou Gao" initials="Q." surname="Gao">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing,100095</city>

          <country>China</country>
        </postal>

        <email>gaoqiangzhou@huawei.com</email>
      </address>
    </author>

    <author fullname="Bing Liu" initials="B." surname="Liu">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing,100095</city>

          <country>China</country>
        </postal>

        <email>leo.liubing@huawei.com</email>
      </address>
    </author>

    <author fullname="Tianran Zhou" initials="T." surname="Zhou">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing,100095</city>

          <country>China</country>
        </postal>

        <email>zhoutianran@huawei.com</email>
      </address>
    </author>

    <author fullname="Shuping Peng" initials="S." surname="Peng">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>156 Beiqing Road</street>

          <city>Beijing,100095</city>

          <country>China</country>
        </postal>

        <email>pengshuping@huawei.com</email>
      </address>
    </author>

    <date day="3" month="March" year="2025"/>

    <abstract>
      <t>IPv6 provides extension header mechanism for additional functions.
      There are emerging features based on the extension headers, such as
      SRv6, Network Slicing, Alternate Marking, iOAM, DetNet etc. In some
      networks, the operators might want to leverage these new features but
      since the network system still using some lagecy encapsulations other
      than IPv6 (e.g. VxLAN, GRE etc.), these features are just not applicable
      for them. </t>

      <t>This document introduces some cases of such scenarios, and discusses
      the potential requirement of defining a new Generalized IPv6 Tunnel
      (GIP6). With GIP6, all the additional functions defined as IPv6
      extension headers could be easily supported, so that the legacy
      encapsulations could migrate to a unified solution rather than
      sccaterred upgrade in each legacy technologies, which is heavy burden
      for the industry. </t>

      <t>Considering network devices have different capabilities of IPv6
      extension header processing, this document also analyses the issues
      found during the deployment of the above new features using IPv6
      extension headers and the protocol extension requirements for IPv6
      capability advertisement are defined.</t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">RFC 2119</xref>.</t>
    </note>
  </front>

  <middle>
    <section anchor="IntroSection" title="Introduction">
      <t>IPv6 provides extension header mechanism for additional functions.
      There are emerging features based on the extension headers, such as:</t>

      <t>- <xref target="RFC8704"/> defines IPv6 encapsulation for SRv6
      network programming.</t>

      <t>- <xref target="I-D.ietf-6man-ipv6-alt-mark"/> defines IPv6
      encapsulation for Alternate Marking.</t>

      <t>- <xref target="I-D.ietf-ippm-ioam-ipv6-options"/> defines IPv6
      encapsulation for IOAM.</t>

      <t>- <xref target="I-D.ietf-6man-enhanced-vpn-vtn-id"/> defines the IPv6
      encapsulation used to determine resource isolation.</t>

      <t>- <xref target="I-D.yzz-detnet-enhanced-data-plane"/>defines the IPv6
      encapsulation for implementing bounded latency.</t>

      <t>There are some scenarios that the network operators want to leverage
      these new features but since the network system still using some lagecy
      encapsulations other than IPv6 (e.g. VxLAN, GRE etc.), so these features
      are not applicable. <xref
      target="I-D.li-rtgwg-generalized-ipv6-tunnel">GIP6</xref> defines a
      generalized IPv6 tunnel to unify the IP tunnels to support the new
      features. With GIP6, all the additional functions defined as IPv6
      extension headers could be easily supported, so that the legacy
      encapsulations could migarate to a unified solution, rather than
      extending all the legacy IP tunnels individually.</t>

      <t>However, network devices have different capabilities of IPv6
      extension header processing, which hugely impact the deployment of these
      features, even causes the packet loss. Thus, this document also analyses
      the issues found during the deployment of the above new features using
      IPv6 extension headers. In order to solve the issues, the capabilities
      of IPv6 extension header process can be advertised among network devices
      and reported from network devices to the controller. Based on these IPv6
      capability information, the new features can be deployed properly. </t>
    </section>

    <section title="Terminology">
      <t>IPv4: Internet Protocol version 4</t>

      <t>IPv6: Internet Protocol version 6</t>

      <t>iOAM: In-situ Operations, Administration, and Maintenance</t>

      <t>SRv6: Segment Routing over IPv6</t>

      <t>VxLAN: Virtual Extensible LAN</t>

      <t>GRE: Generic Routing Encapsulation</t>

      <t>GTP: GPRS Tunnelling Protocol</t>

      <t>GPRS: General Packet Radio Service</t>
    </section>

    <section title="Scenarios and Gaps">
      <t/>

      <section title="Private line E2E Measurement/Troubleshooting">
        <t>Operators might want to leverage iOAM technologies to provide users
        with performance measurement and troubleshooting capabilities across
        the entire private line, which requires end-to-end iOAM implementation
        might across the WAN (Wide Area Network) and the DCN (Data Center
        Network). Especially in the SFC (Service Function Chain) scenario, the
        path of data flow may enter and exit the cloud multiple times, making
        fault localization extremely complex. The current issue is that the
        WAN and DCN might use different VPN technologies, for example, SRv6
        for WAN and VxLAN for DCN. In the DCN segment (as well as the access
        segment in some cases), the lack of support for iOAM in VxLAN results
        in an inability to have end-to-end iOAM functionality across the path.
        This limits the ability to have unified performance measurement and
        troubleshooting across the entire private line.</t>
      </section>

      <section title="V2X Experience Guaranting">
        <t>In Vehicle-to-Everything (V2X) communications, the network usually
        needs to distinguish different types of data flows (for example: media
        flows and remote driving signaling flows). And one common choice is to
        utilizing network slicing technology, so as to meet the performance
        and priority requirements of different services. Moreover, it is also
        necessary to provide high-precision performance monitoring and fault
        localization capabilities for critical services (e.g., remote
        driving). This requires end-to-end iOAM features throughout the entire
        path from the RAN to the WAN. In current V2X networks, GTP is the
        standard encapsulation protocol in Radio Access Network (RAN), and
        IPv6 or SRv6 is the mainstream encapsulation protocol in WAN. The GTP
        tunnel itself lacks support for advanced features such as network
        slicing and iOAM, making it impossible to achieve end-to-end
        performance detection and slice-based flow differentiation and
        management.</t>
      </section>

      <section title="SD-WAN E2E Slicing/iOAM ">
        <t>Similarly as the V2X case described above, in SD-WAN scenario, due
        to the widely used GRE protocol does not support iOAM and slicing
        features, it is also impossible to achieve end-to-end performance
        detection and slice-based flow differentiation and management.</t>
      </section>

      <section title="Data sharing/exchagne between Enterprises">
        <t>Users such as enterprises or hospitals may have demand for data
        sharing or exchange. Since these data often involve sensitive
        information, it is necessary to protect the data packets accordingly.
        One good way is to use an identifier encapsulated into IPv6 header to
        classify and identify the sensitivity level of data, so that the
        circulation scope of sensitive data can be controlled and a credible
        network path can be ensured throughout the entire process. Besides,
        when the data reaches the receiver, the receiver can also determine
        whether the data is credible and whether it can be received based on
        the ID.</t>

        <t>In this scenario, there are two situations: </t>

        <t><list style="hanging">
            <t hangText="1)">Data transmission between users that across
            cities<list style="empty">
                <t>In this situation, the tunnel encapsulation methods may be
                different in different metropolitan area networks, and the
                methods for metropolitan area networks and backbone networks
                may also differ. </t>
              </list></t>

            <t hangText="2)">User data entering into the cloud<list
                style="empty">
                <t>Clouds are generally connected to backbone networks, the
                methods for metropolitan area networks and backbone networks
                may be different.</t>
              </list></t>
          </list>The differentiated tunnel encapsulation methods may result in
        the loss of the encapsulated ID on the packet. For example, when
        packets enter MPLS tunnels from IPv6 domain, information encapsulated
        in IPv6 header is lost. As a result, the credibility and
        controllability of data circulation service cannot be guaranteed. </t>
      </section>
    </section>

    <section title="Protocol Extensions of Capability Advertisement">
      <t/>

      <section title="Problems of Extention Header Processing">
        <t>As described in <xref target="IntroSection"/>, many new features
        are emerging and the corresponding encapsulations over the IPv6 are
        defined. There features uses the IPv6 extension headers including HbH
        (Hop-by-Hop Options Header), DoH (Destination Options Header) and SRH
        (Segment Routing Header). </t>

        <t>In the process of deployment of these new features, because network
        devices have different capabilities of IPv6 extension header
        processing, the following issues are identified: </t>

        <t><list style="hanging">
            <t hangText="-">Some legacy network devices can only process IPv6
            extension header (Hop-by-Hop Options Header) on slow path, which
            has negative impact on the routing jobs on the control plane. So
            in existing networks, packet with IPv6 extension headers are
            usually blocked by ACL. This will cause the packet loss on these
            network devices if the packet encapsulated with GIP6 tunnel and
            the HbH is used for the new features.</t>

            <t hangText="-">Network devices can only support some of the
            extension headers used for the new features. If the packet
            encapsulated with GIP6 tunnel and specific types of IPv6 extension
            headers used cannot be supported by these network devices, new
            features cannot be guaranteed along the path.</t>

            <t hangText="-">Network devices can only process limited number of
            options in an IPv6 extension header (including HbH and DoH). So
            when multiple options coexists to support different new features
            in the IPv6 extension header of the GIP6 tunnel, those devices may
            drop the packet.</t>
          </list></t>
      </section>

      <section title="Protocol Extensions">
        <t>To solve the above issues, there are requirements for protocol
        extensions to advertise the capability of IPv6 extension header
        processing so as to identify the unavailable nodes and facilitate the
        deployment of new features successfully.</t>

        <section title="Capability Advertisement">
          <t>There are two different ways. One is to advertise the capability
          among network devices. So that a network device can find the right
          next hop with IPv6 extension header processing capabilities. In this
          case, IGP or BGP-SPF extensions are required for the information
          distribution. The other way is to report the IPv6 capabilities from
          network nodes to a controller. So that the network controller can
          calculate the right path comprised with available nodes. In this
          case, BGP-LS or NETCONF/YANG are considered for the extensions.</t>
        </section>

        <section title="Inter-Domain Operation">
          <t>A path may be across multiple network domains. The ingress node
          of the GIP6 tunnel need to know if all the nodes along the path can
          process the IPv6 extension headers properly. In this case, the
          capability of IPv6 extension header processing need to be
          distributed among multiple domains. BGP can be extended to advertise
          the IPv6 capability information from the egress node to the ingress
          node. If there is a controller collecting IPv6 capability
          information from multiple domains, PCEP or BGP can be extended and
          used by the controller to deliver information to the ingress node
          about the right path along which network nodes can process the IPv6
          extension header properly.</t>
        </section>

        <section title="Capabilities about IPv6 Extension Header">
          <t>Network devices need to advertise its capability information
          about what IPv6 extension header can be supported. These
          capabilities may include:</t>

          <t><list style="symbols">
              <t>Supporting Hop by Hop options header (HbH) or not.</t>

              <t>Fast path or slow path processing of HbH.</t>

              <t>Supporting Segment Routing Header (SRH) or not.</t>

              <t>Supporting Destination Options header (DoH) or not.</t>

              <t>Capabilities about coexistence of multiple extension headers,
              for example, the combination of HbH and Authentication Header
              (AH).</t>

              <t>The maximum length of each IPv6 extension header</t>

              <t>The maximum total length of IPv6 extension headers</t>
            </list></t>
        </section>

        <section title="Capability about Options of IPv6 Extension Header">
          <t>Network devices need to advertise its capability information
          about process options in the IPv6 extension headers. These
          capabilities may include:</t>

          <t><list style="symbols">
              <t>The maximum number of options supported in the HbH</t>

              <t>The maximum number of options supported in the DoH</t>

              <t>Supporting SRH TLV or not and the maximum number of TLVs
              supported in the SRH</t>

              <t>The maximum number of segments in the SRH</t>
            </list></t>
        </section>

        <section title="Capability about Specific Features">
          <t>In addition to the common capabilities described above, network
          devices may support some specific features only. These capabilities
          may include:</t>

          <t><list style="symbols">
              <t>Slicing: the NRP option can be supported or not. If support,
              the NRP option can be placed in HbH and/or DoH.</t>

              <t>Alternate Marking: the Alternate Marking option can be
              supported or not. If support, the Alternate Marking option can
              be placed in HbH and/or DoH.</t>

              <t>IOAM: the IOAM option can be supported or not. If support,
              the IOAM option can be placed in HbH and/or DoH.</t>

              <t>APN: the APN option can be supported or not. If support, the
              APN option can be placed in HbH, DoH and/or SRH TLV.</t>

              <t>DetNet: the <xref
              target="I-D.yzz-detnet-enhanced-data-plane">BLI option</xref>
              can be supported or not. If support, the BLI option can be
              placed in HbH and/or DoH.</t>
            </list></t>
        </section>
      </section>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This document makes no request of IANA.</t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.8704"?>

      <?rfc include="reference.I-D.ietf-6man-enhanced-vpn-vtn-id"?>

      <?rfc include="reference.I-D.ietf-6man-ipv6-alt-mark"?>

      <?rfc include="reference.I-D.ietf-ippm-ioam-ipv6-options"?>

      <?rfc include="reference.I-D.yzz-detnet-enhanced-data-plane"?>

      <?rfc include="reference.I-D.li-apn-ipv6-encap"?>

      <?rfc include="reference.I-D.li-rtgwg-generalized-ipv6-tunnel"?>
    </references>
  </back>
</rfc>
