<?xml version="1.0"encoding="iso-8859-1"?> <?rfc toc="yes"?> <?rfc symrefs="yes" ?> <?rfc sortrefs="yes" ?> <?rfc compact="yes" ?> <?rfc subcompact="no" ?>encoding="UTF-8"?> <!DOCTYPE rfc [ <!ENTITY nbsp " "> <!ENTITY zwsp "​"> <!ENTITY nbhy "‑"> <!ENTITY wj "⁠"> ]> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" category="std" consensus="true" ipr="trust200902" docName="draft-ietf-ippm-ioam-conf-state-10"consensus="true" submissionType="IETF">number="9359" tocInclude="true" symRefs="true" sortRefs="true" updates="" obsoletes="" xml:lang="en" version="3"> <!-- xml2rfc v2v3 conversion 3.15.2 --> <front> <titleabbrev="Ping Enabledabbrev="Ping-Enabled IOAM Capabilities"> Echo Request/Reply for EnabledIn-situIn Situ OAM (IOAM) Capabilities </title> <seriesInfo name="RFC" value="9359"/> <author fullname="Xiao Min" initials="X" surname="Min"> <organization>ZTE Corp.</organization> <address> <postal><street></street> <!-- Reorder these if your country does things differently --><street/> <city>Nanjing</city><region></region> <code></code><region/> <code/> <country>China</country> </postal> <phone>+86 25 88013062</phone> <email>xiao.min2@zte.com.cn</email><!-- uri and facsimile elements may also be added --></address> </author> <author fullname="Greg Mirsky" initials="G" surname="Mirsky"> <organization>Ericsson</organization> <address> <postal><street></street> <!-- Reorder these if your country does things differently --> <city></city> <region></region> <code></code><street/> <city/> <region/> <code/> <country>United States of America</country> </postal><phone></phone><phone/> <email>gregimirsky@gmail.com</email><!-- uri and facsimile elements may also be added --></address> </author> <author fullname="Lei Bo" initials="L" surname="Bo"> <organization>China Telecom</organization> <address> <postal><street></street> <!-- Reorder these if your country does things differently --><street/> <city>Beijing</city><region></region> <code></code><region/> <code/> <country>China</country> </postal> <phone>+86 10 50902903</phone> <email>leibo@chinatelecom.cn</email><!-- uri and facsimile elements may also be added --></address> </author> <dateyear="2022"/> <area>Transport</area> <workgroup>IPPM Working Group</workgroup> <keyword>Request for Comments</keyword> <keyword>RFC</keyword> <keyword>Internet Draft</keyword> <keyword>I-D</keyword>year="2023" month="April" /> <area>tsv</area> <workgroup>ippm</workgroup> <abstract> <t> This document describes a generic format for use in echo request/reply mechanisms, which can be used within anIn situ Operations, Administration, and Maintenance (IOAM) domain,IOAM-Domain, allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of each IOAM transit and IOAM decapsulating node. The generic format is intended to be used with a variety of data planes such as IPv6, MPLS, Service Function Chain(SFC)(SFC), and Bit Index Explicit Replication (BIER).</t> </abstract> </front> <middle><section title="Introduction"><section> <name>Introduction</name> <t> In situ Operations, Administration, and Maintenance (IOAM) (<xref target="RFC9197"/> <xref target="RFC9326"/>) defines data fields that record OAM information within the packet while the packet traverses a particular network domain, called anIOAM domain."IOAM-Domain". IOAM can complement or replace other OAM mechanisms, such as ICMP or other types of probe packets.</t> <t> As specified in <xref target="RFC9197"/>, within theIOAM domain,IOAM-Domain, the IOAM data may be updated by network nodes that the packet traverses. The devicewhichthat adds an IOAM header to the packet is called an "IOAM encapsulating node". In contrast, the devicewhichthat removes an IOAM header is referred to as an "IOAM decapsulating node". Nodes within the domain that are aware of IOAM data andread and/or writethat read, write, and/or process IOAM data are called "IOAM transit nodes". IOAM encapsulating or decapsulating nodes can also serve as IOAM transit nodes at the same time. IOAM encapsulating or decapsulating nodes are also referred to asIOAM domain edge devices,IOAM-Domain "edge devices", which can be hosts or network devices. <xref target="RFC9197"/> defines four IOAM option types, and <xref target="RFC9326"/> introduces a new IOAM option type called theDirect"Direct Export (DEX)Option-Type,Option-Type", which is different from the other four IOAM option types defined in <xref target="RFC9197"/>onregarding how to collect the operational and telemetry information defined in <xref target="RFC9197"/>.</t> <t> As specified in <xref target="RFC9197"/>, IOAM is focused on "limited domains" as defined in <xref target="RFC8799"/>. In a limited domain, a control entity that has control over every IOAM device may be deployed. If that's the case, the control entity can provision both the explicit transport path and the IOAM header applied to the data packet at every IOAM encapsulating node.</t> <t> In a case when a control entity that has control over every IOAM device is not deployed in theIOAM domain,IOAM-Domain, the IOAM encapsulating node needs to discover the enabled IOAM capabilities at the IOAM transit and decapsulatingnodes. Fornodes: for example, what types of IOAM tracing data can be added or exported by the transit nodes along the transport path of the data packet IOAM is applied to. The IOAM encapsulating node can then add the correct IOAM header to the data packet according to the discovered IOAM capabilities. Specifically, the IOAM encapsulating node first identifies the types and lengths of IOAM options included in the IOAM data fields according to the discovered IOAM capabilities. Then the IOAM encapsulating node can add the IOAM header to the data packet based on the identified types and lengths of IOAM options included in the IOAM data fields. The IOAM encapsulating node may use NETCONF/YANG or IGP to discover these IOAM capabilities. However, NETCONF/YANG or IGP has some limitations:<list style="symbols"> <t> When</t> <ul spacing="normal"> <li>When NETCONF/YANG is used in this scenario, each IOAM encapsulating node (including the host when it takes the role of an IOAM encapsulating node) needs to implement a NETCONF Client, and each IOAM transit and IOAM decapsulating node (including the host when it takes the role of an IOAM decapsulating node) needs to implement a NETCONF Server,theso complexity can be an issue. Furthermore, each IOAM encapsulating node needs to establish a NETCONF Connection with each IOAM transit and IOAM decapsulating node,theso scalability can be an issue.</t> <t> When</li> <li>When IGP is used in this scenario, the IGP andIOAM domainsIOAM-Domains don't always have the same coverage. For example, when the IOAM encapsulating node or the IOAM decapsulating node is a host, the availability can be an issue. Furthermore, it might be too challenging to reflect enabled IOAM capabilities at the IOAM transit and IOAM decapsulating node if these are controlled by a local policy depending on the identity of the IOAM encapsulating node.</t> </list> </t></li> </ul> <t> This document specifies formats and objects that can be used in the extension of echo request/reply mechanisms used in IPv6 (including Segment Routingwithover IPv6 (SRv6) dataplane (SRv6)),plane), MPLS (including Segment Routingwithover MPLS (SR-MPLS) dataplane (SR-MPLS)), SFCplane), Service Function Chain (SFC), andBIERBit Index Explicit Replication (BIER) environments, which can be used within theIOAM domain,IOAM-Domain, allowing the IOAM encapsulating node to discover the enabled IOAM capabilities of each IOAM transit and IOAM decapsulating node.</t> <t> The following documents contain references to the echo request/reply mechanisms used in IPv6 (including SRv6), MPLS (including SR-MPLS),SFCSFC, and BIER environments:<list style="symbols"> <t> <xref target="RFC4443"/> ("Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification"), <xref target="RFC4620"/> ("IPv6 Node Information Queries"), <xref target="RFC4884"/> ("Extended ICMP to Support Multi-Part Messages") and <xref target="RFC8335"/> ("PROBE: A Utility for Probing Interfaces") </t> <t> <xref target="RFC8029"/> ("Detecting Multiprotocol Label Switched (MPLS) Data-Plane Failures") </t> <t> <xref target="I-D.ietf-sfc-multi-layer-oam"/> ("Active OAM for Service Function Chaining (SFC)")</t><t><ul spacing="normal"> <li> "<xref target="RFC4443" format="title"/>" <xref target="RFC4443"/></li> <li>"<xref target="RFC4620" format="title"/>" <xref target="RFC4620"/></li> <li>"<xref target="RFC4884" format="title"/>" <xref target="RFC4884"/></li> <li>"<xref target="RFC8335" format="title"/>" <xref target="RFC8335"/></li> <li>"<xref target="RFC8029" format="title"/>" <xref target="RFC8029"/></li> <li>"<xref target="I-D.ietf-sfc-multi-layer-oam" format="title"/>" <xref target="I-D.ietf-sfc-multi-layer-oam"/></li> <li>"<xref target="I-D.ietf-bier-ping" format="title"/>" <xreftarget="I-D.ietf-bier-ping"/> ("BIER Ping and Trace") </t> </list> </t>target="I-D.ietf-bier-ping"/></li> </ul> <t> It is expected that the specification of the instantiation of each of these extensions will be done in the form of an RFC jointly designed by the working group that develops or maintains the echo request/reply protocol and the IETF IP Performance Measurement (IPPM) Working Group.</t><t> Note that in<t>In thisdocumentdocument, note that the echo request/reply mechanism used in IPv6 does not mean ICMPv6 Echo Request/Reply <xreftarget="RFC4443"/>,target="RFC4443"/> butmeansdoes mean IPv6 Node Information Query/Reply <xref target="RFC4620"/>.</t><t> Fate<t>Fate sharing is a common requirement for all kinds of active OAM packets, including echorequest is among them, inrequests. In thisdocumentdocument, that means an echo request is required to traverseathe path of an IOAM data packet. This requirement can be achieved by, e.g., applying the same explicit path or ECMP processing to both echo request and IOAM datapacket. Specific to applypackets. Specifically, the same ECMP processing can be applied to both echo request and IOAM datapacket, one possible way is to populatepackets, by populating the samevalue(s) ofvalue or values in any ECMP affectingfield(s) infields of theecho request.</t>packets.</t> </section><section title="Conventions"> <section title="Requirements Language"><section> <name>Conventions</name> <section> <name>Requirements Language</name> <t> The key words"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY","<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and"OPTIONAL""<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described inBCP 14BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shownhere.</t>here. </t> </section><section title="Abbreviations"> <t> BIER: Bit<section> <name>Abbreviations</name> <dl spacing="normal" newline="false"> <dt>BIER:</dt> <dd>Bit Index ExplicitReplication</t> <t> BGP: BorderReplication</dd> <dt>BGP:</dt> <dd>Border GatewayProtocol</t> <t> DEX: Direct Export</t> <t> ECMP: Equal-Cost Multipath</t> <t> E2E: Edge to Edge</t> <t> ICMP: InternetProtocol</dd> <dt>DEX:</dt> <dd>Direct Export</dd> <dt>ECMP:</dt> <dd>Equal-Cost Multipath</dd> <dt>E2E:</dt> <dd>Edge to Edge</dd> <dt>ICMP:</dt> <dd>Internet Control MessageProtocol</t> <t> IGP: InteriorProtocol</dd> <dt>IGP:</dt> <dd>Interior GatewayProtocol</t> <t> IOAM: InProtocol</dd> <dt>IOAM:</dt> <dd>In situ Operations, Administration, andMaintenance</t> <t> LSP: LabelMaintenance</dd> <dt>LSP:</dt> <dd>Label SwitchedPath</t> <t> MPLS: Multi-ProtocolPath</dd> <dt>MPLS:</dt> <dd>Multiprotocol LabelSwitching</t> <t> MTU: MaximumSwitching</dd> <dt>MTU:</dt> <dd>Maximum TransmissionUnit</t> <t> NTP: NetworkUnit</dd> <dt>NETCONF:</dt> <dd>Network Configuration Protocol</dd> <dt>NTP:</dt> <dd>Network TimeProtocol</t> <t> OAM: Operations,Protocol</dd> <dt>OAM:</dt> <dd>Operations, Administration, andMaintenance</t> <t> PCEP: PathMaintenance</dd> <dt>PCEP:</dt> <dd>Path Computation Element(PCE)CommunicationProtocol</t> <t> POSIX: PortableProtocol</dd> <dt>POSIX:</dt> <dd>Portable Operating SystemInterface</t> <t> POT: Proof of Transit</t> <t> PTP: PrecisionInterface</dd> <dt>POT:</dt> <dd>Proof of Transit</dd> <dt>PTP:</dt> <dd>Precision TimeProtocol</t> <t> SR-MPLS: SegmentProtocol</dd> <dt>SoP:</dt> <dd>Size of POT</dd> <dt>SR-MPLS:</dt> <dd>Segment Routingwith MPLS data plane</t> <t> SRv6: Segmentover MPLS</dd> <dt>SRv6:</dt> <dd>Segment Routingwith IPv6 data plane</t> <t> SFC: Serviceover IPv6</dd> <dt>SFC:</dt> <dd>Service FunctionChain</t> <t> TTL: TimeChain</dd> <dt>TTL:</dt> <dd>Time toLive, thisLive (this is also the Hop Limit field in the IPv6header</t>header)</dd> <dt>TSF:</dt> <dd>TimeStamp Format</dd></dl> </section> </section><section title="IOAM<section> <name>IOAM CapabilitiesFormats"> <section title="IOAMFormats</name> <section> <name>IOAM Capabilities QueryContainer">Container</name> <t> For echorequest,requests, the IOAM Capabilities Query uses a containerwhichthat has the following format:</t> <figureanchor="Figure_1" title="IOAManchor="Figure_1"> <name>IOAM Capabilities Query Container of an EchoRequest">Request</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM Capabilities Query Container Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . List of IOAM Namespace-IDs . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> When this container is present in the echo request sent by an IOAM encapsulating node,that meansthe IOAM encapsulating node requests that the receiving nodetoreply with its enabled IOAM capabilities. If there is no IOAM capability to be reported by the receiving node, then this containerMUST<bcp14>MUST</bcp14> be ignored by the receivingnode, whichnode. This means the receiving nodeMUST<bcp14>MUST</bcp14> send an echo reply without IOAM capabilities or no echo reply, in the light of whether the echo request includesothercontainers other than the IOAM Capabilities Query Container. A list of IOAM Namespace-IDs (one or more Namespace-IDs)MUST<bcp14>MUST</bcp14> be included in this container in the echorequest, andrequest; if present, the Default-Namespace-ID 0x0000MUST<bcp14>MUST</bcp14> be placed at the beginning of the list of IOAM Namespace-IDs. The IOAM encapsulating node requests only the enabled IOAM capabilities that match one of the Namespace-IDs. Inclusion of the Default-Namespace-ID 0x0000 elicits replies only for capabilities that are configured with the Default-Namespace-ID0x0000.The0x0000. The Namespace-ID has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>.</t>target="RFC9197" sectionFormat="of" section="4.3"/>.</t> <t> The IOAM Capabilities Query Container has a container header that is used to identify the typeand optionallyand, optionally, the length of the containerpayload, and thepayload. The container payload (List of IOAM Namespace-IDs) is zero-padded to aligntowith a 4-octet boundary. Since the Default-Namespace-IDof0x0000 is mandated to appear first in the list, any other occurrences of 0x0000MUST<bcp14>MUST</bcp14> be disregarded.</t> <t> The length, structure, and definition of the IOAM Capabilities Query Container Headerdependsdepend on the specific deployment environment.</t> </section><section title="IOAM<section> <name>IOAM Capabilities ResponseContainer">Container</name> <t> For echoreply,replies, the IOAM Capabilities Response uses a containerwhichthat has the following format:</t> <figureanchor="Figure_2" title="IOAManchor="Figure_2"> <name>IOAM Capabilities Response Containeroffor an EchoReply">Reply</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM Capabilities Response Container Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . List of IOAM Capabilities Objects . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> When this container is present in the echo reply sent by an IOAM transit node or IOAM decapsulating node,that meansthe IOAM function is enabled at this node, and this container contains the enabled IOAM capabilities of the sender. A list of IOAM capabilities objects (one or more objects)whichthat contains the enabled IOAM capabilitiesMUST<bcp14>MUST</bcp14> be included in this container of the echo replyexceptunless the sender encounters an error (e.g., no matched Namespace-ID).</t> <t> The IOAM Capabilities Response Container has a container header that is used to identify the typeand optionallyand, optionally, the length of the container payload. The container headerMUST<bcp14>MUST</bcp14> be defined such that it falls on afour-octet4-octet boundary.</t> <t> The length, structure, and definition of the IOAM Capabilities Response Container Header depends on the specific deployment environment.</t> <t> Based on the IOAM data fields defined in <xref target="RFC9197"/> and <xref target="RFC9326"/>, six types of objects are defined in this document. The same type of objectMAY<bcp14>MAY</bcp14> be present in the IOAM Capabilities Response Container more than once, only if listed with a different Namespace-ID.</t> <t> Similar to the container, each object has an object header that is used to identify the type and length of the object payload. The object payloadMUST<bcp14>MUST</bcp14> be defined such that it falls on afour-octet4-octet boundary.</t> <t> The length, structure, and definition ofObject Headerthe object header depends on the specific deployment environment.</t><section title="IOAM<section> <name>IOAM Pre-allocated Tracing CapabilitiesObject">Object</name> <figureanchor="Figure_3" title="IOAManchor="Figure_3"> <name>IOAM Pre-allocated Tracing CapabilitiesObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM Pre-allocated Tracing Capabilities Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IOAM-Trace-Type | Reserved |W| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID | Ingress_MTU | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Ingress_if_id (short or wide format) ...... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> Whenthisthe IOAM Pre-allocated Tracing Capabilities Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM transitnodenode, and the IOAM pre-allocated tracing function is enabled at this IOAM transit node.</t><t><t>The IOAM-Trace-Type field has the same definition as what's specified inSection 4.4 of<xreftarget="RFC9197"/>.</t> <t>target="RFC9197" sectionFormat="of" section="4.4"/>.</t> <t>The Reserved fieldis reserved for future use and MUST<bcp14>MUST</bcp14> beset to zero,zeroed on transmission andMUST beignoredwhen non-zero.</t> <t>on receipt.</t> <t>The W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. The W-bit is clear if the Ingress_if_id is in short format.</t><t><t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t><t><t>The Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received the echo request.</t><t><t>The Ingress_if_id field has 16 bits (in short format) or 32 bits (in wide format) and specifies the identifier of the ingress interface from which the sending node received the echo request. If the W-bit iscleared that indicatescleared, the Ingress_if_id field has 16bits,bits; then the 16 bits following the Ingress_if_id field are reserved for futureuse and MUSTuse, <bcp14>MUST</bcp14> be set to zero, andMUST<bcp14>MUST</bcp14> be ignored when non-zero.</t> </section><section title="IOAM<section> <name>IOAM Incremental Tracing CapabilitiesObject">Object</name> <figureanchor="Figure_4" title="IOAManchor="Figure_4"> <name>IOAM Incremental Tracing CapabilitiesObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM Incremental Tracing Capabilities Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IOAM-Trace-Type | Reserved |W| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID | Ingress_MTU | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Ingress_if_id (short or wide format) ...... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure><t> When this<t>When the IOAM Incremental Tracing Capabilities Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM transitnodenode, and the IOAM incremental tracing function is enabled at this IOAM transit node.</t><t><t>The IOAM-Trace-Type field has the same definition as what's specified inSection 4.4 of<xreftarget="RFC9197"/>.</t> <t>target="RFC9197" sectionFormat="of" section="4.4"/>.</t> <t>The Reserved fieldis reserved for future use and MUST<bcp14>MUST</bcp14> beset to zero,zeroed on transmission andMUST beignoredwhen non-zero.</t> <t>on receipt.</t> <t>The W flag indicates whether Ingress_if_id is in short or wide format. The W-bit is set if the Ingress_if_id is in wide format. The W-bit is clear if the Ingress_if_id is in short format.</t><t><t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t><t><t>The Ingress_MTU field has 16 bits and specifies the MTU (in octets) of the ingress interface from which the sending node received the echo request.</t><t><t>The Ingress_if_id field has 16 bits (in short format) or 32 bits (in wide format) and specifies the identifier of the ingress interface from which the sending node received the echo request. If the W-bit iscleared that indicatescleared, the Ingress_if_id field has 16bits,bits; then the 16 bits following the Ingress_if_id field are reserved for futureuse and MUSTuse, <bcp14>MUST</bcp14> be set to zero, andMUST<bcp14>MUST</bcp14> be ignored when non-zero.</t> </section> <sectiontitle="IOAM Proof-of-Transitanchor="ioam-cap-res-cont"> <name>IOAM Proof of Transit CapabilitiesObject">Object</name> <figureanchor="Figure_5" title="IOAM Proof-of-Transitanchor="Figure_5"> <name>IOAM Proof of Transit CapabilitiesObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAMProof-of-TransitProof of Transit Capabilities Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID | IOAM-POT-Type |SoP| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> Whenthisthe IOAM Proof of Transit Capabilities Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM transit node and the IOAM Proof of Transit function is enabled at this IOAM transit node.</t><t><t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t> <t> The IOAM-POT-Type field has the same definition as what's specified inSection 4.5 of<xreftarget="RFC9197"/>.</t> <t>target="RFC9197" sectionFormat="of" section="4.5"/>.</t> <t>The SoP (Size of POT) field has twobits, which meansbits that indicate the size of "PktID" and "Cumulative"data thatdata, which are specified inSection 4.5 of<xreftarget= "RFC9197"/>.target="RFC9197" sectionFormat="of" section="4.5"/>. This document defines SoP as follows:<list> <t> 0b00 means 64-bit</t> <dl spacing="normal"> <dt>0b00:</dt><dd>64-bit "PktID" and 64-bit "Cumulative"data.</t> <t> 0b01~0b11: Reserveddata</dd> <dt>0b01~0b11:</dt><dd>reserved for futurestandardization</t> </list> </t> <t>standardization</dd> </dl> <t>The Reserved fieldis reserved for future use and MUST<bcp14>MUST</bcp14> beset to zero,zeroed on transmission andMUST beignoredwhen non-zero.</t>on receipt.</t> </section> <sectiontitle="IOAManchor="ioam-e2e"> <name>IOAM Edge-to-Edge CapabilitiesObject">Object</name> <figureanchor="Figure_6" title="IOAManchor="Figure_6"> <name>IOAM Edge-to-Edge CapabilitiesObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM Edge-to-Edge Capabilities Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID | IOAM-E2E-Type | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |TSF| Reserved | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure> <t> Whenthisthe IOAM Edge-to-Edge Capabilities Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM decapsulating node and IOAM edge-to-edge function is enabled at this IOAM decapsulating node.</t><t><t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t><t><t>The IOAM-E2E-Type field has the same definition as what's specified inSection 4.6 of<xreftarget="RFC9197"/>.</t> <t>target="RFC9197" sectionFormat="of" section="4.6"/>.</t> <t>The TSF field specifies the timestamp format used by the sending node. Aligned with three possible timestamp formats specified inSection 5 of<xreftarget="RFC9197"/>,target="RFC9197" sectionFormat="of" section="5"/>, this document defines TSF as follows:<list> <t> 0b00: PTP</t> <dl spacing="normal"> <dt>0b00:</dt><dd>PTP truncated timestampformat</t> <t> 0b01: NTPformat</dd> <dt>0b01:</dt><dd>NTP 64-bit timestampformat</t> <t> 0b10:format</dd> <dt>0b10:</dt><dd> POSIX-based timestampformat</t> <t> 0b11:format</dd> <dt>0b11:</dt><dd> Reserved for futurestandardization</t> </list> </t> <t>standardization</dd> </dl> <t>The Reserved fieldis reserved for future use and MUST<bcp14>MUST</bcp14> beset to zero,zeroed on transmission andMUST beignoredwhen non-zero.</t>on receipt.</t> </section><section title="IOAM<section> <name>IOAM DEX CapabilitiesObject">Object</name> <figureanchor="Figure_7" title="IOAManchor="Figure_7"> <name>IOAM DEX CapabilitiesObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM DEX Capabilities Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IOAM-Trace-Type | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure><t> When this<t>When the IOAM DEX Capabilities Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM transit node and the IOAM direct exporting function is enabled at this IOAM transit node.</t><t><t>The IOAM-Trace-Type field has the same definition as what's specified inSection 3.2 of<xreftarget="RFC9326"/>.</t> <t>target="RFC9326" sectionFormat="of" section="3.2"/>.</t> <t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Object of the echo request.</t><t><t>The Reserved fieldis reserved for future use and MUST<bcp14>MUST</bcp14> beset to zero,zeroed on transmission andMUST beignoredwhen non-zero.</t>on receipt.</t> </section><section title="IOAM<section> <name>IOAM End-of-DomainObject">Object</name> <figureanchor="Figure_8" title="IOAManchor="Figure_8"> <name>IOAM End-of-DomainObject">Object</name> <artwork align="center"><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . IOAM End-of-Domain Object Header . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Namespace-ID |Must Be ZeroReserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> </figure><t> When this<t>When the IOAM End-of-Domain Object is present in the IOAM Capabilities Response Container,that meansthe sending node is an IOAM decapsulating node. Unless the IOAM Edge-to-Edge Capabilities Object is present, which also indicates that the sending node is an IOAM decapsulating node, the IOAM End-of-Domain ObjectMUST<bcp14>MUST</bcp14> be present in the IOAM Capabilities Response Container sent by an IOAM decapsulating node. When the IOAM edge-to-edge function is enabled at the IOAM decapsulating node,it's RECOMMENDED to includeincluding only the IOAM Edge-to-Edge CapabilitiesObject butObject, not the IOAM End-of-DomainObject.</t> <t>Object, is <bcp14>RECOMMENDED</bcp14>.</t> <t>The Namespace-ID field has the same definition as what's specified inSection 4.3 of<xreftarget="RFC9197"/>, it MUSTtarget="RFC9197" sectionFormat="of" section="4.3"/>. It <bcp14>MUST</bcp14> be one of the Namespace-IDs listed in the IOAM Capabilities Query Container.</t> <t> Reserved field <bcp14>MUST</bcp14> be zeroed on transmission and ignored on receipt.</t> </section> </section> </section><section title="Operational Guide"><section> <name>Operational Guide</name> <t> Once the IOAM encapsulating node is triggered to discover the enabled IOAM capabilities of each IOAM transit and IOAM decapsulating node, the IOAM encapsulating node will send echo requests that include the IOAM Capabilities QueryContainer. First,Container as follows:</t> <ul spacing="normal"> <li>First, with TTL equal to 1 to reach the closestnode, whichnode (which may or may not be an IOAM transitnode or not. Thennode).</li> <li>Then, with TTL equal to 2 to reach the second-nearestnode, whichnode (which also may or may not be an IOAM transitnode or not. And further,node).</li> <li>Then, further increasing by 1 the TTL every time the IOAM encapsulating node sends a new echo request, until the IOAM encapsulating node receives an echo reply sent by the IOAM decapsulatingnode, whichnode (which contains the IOAM Capabilities Response Container including the IOAM Edge-to-Edge Capabilities Object or the IOAM End-of-DomainObject. AsObject).</li></ul> <t>As a result, the echo requests sent by the IOAM encapsulating node will reach all nodes one by one along the transport path of IOAM datapacket. Alternatively,packet.</t> <t>Alternatively, if the IOAM encapsulating node knows precisely all the IOAM transit and IOAM decapsulating nodes beforehand, once the IOAM encapsulating node is triggered to discover the enabled IOAM capabilities, it can send an echo request to each IOAM transit and IOAM decapsulating node directly, without TTL expiration.</t> <t> The IOAM encapsulating node may be triggered by the device administrator, the network management system, the network controller, or data traffic. The specific triggering mechanisms are outside the scope of this document.</t> <t> Each IOAM transit and IOAM decapsulating node that receives an echo request containing the IOAM Capabilities Query Container will send an echo reply to the IOAM encapsulating node. For the echo reply, there is an IOAM Capabilities Response Container containing one or more Objects. The IOAM Capabilities Query Container of the echo request would be ignored by the receiving node unaware of IOAM.</t> <t> Note that the mechanism defined in this document applies to all kinds of IOAM option types, whether the four types of IOAMoptionoptions defined in <xref target="RFC9197"/> or the DEX type of IOAM option defined in <xreftarget="RFC9326"/>, specifically,target="RFC9326"/>. Specifically, when applied to the IOAM DEX option,itthe mechanism allows the IOAM encapsulating node to discover which nodes along the transport path support IOAM direct exporting and which trace data types are supported to be directly exported at these nodes.</t> </section><section title="IANA Considerations"> <t> This document requests the following IANA Actions.</t><section> <name>IANA Considerations</name> <t> IANAis requested to createhas created a registrygroupnamed"In-Situ"In Situ OAM (IOAM)Capabilities Parameters".</t>Capabilities".</t> <t> Thisgroup will includeregistry includes the followingregistries:</t> <t><list style="symbols"> <t>IOAMsubregistries:</t> <ul spacing="normal"> <li>IOAM SoPCapability</t> <t>IOAMCapability</li> <li>IOAM TSFCapability</t> </list></t> <t> New registries in this group can be created via RFC Required process as per <xref target="RFC8126"/>.</t>Capability</li> </ul> <t> The subsequent subsections detail the registries herein contained.</t> <t> Considering the Containers/Objects defined in this document that would be carried in different types of Echo Request/Reply messages, such as ICMPv6 or LSP Ping, it is intended that the registries for Container/Object Type would be requested in subsequent documents.</t><section title="IOAM<section> <name>IOAM SoP CapabilityRegistry">Registry</name> <t> This registry defines4 code pointsfour codepoints for the IOAM SoP Capability field for identifying the size of "PktID" and "Cumulative" data as explained inSection 4.5 of<xreftarget="RFC9197"/>.</t>target="RFC9197" sectionFormat="of" section="4.5"/>.</t> <t> A new entry in this registry requires the followingfields:<list style="symbols"> <t> SoP: sizefields:</t> <ul spacing="normal"> <li> SoP (Size ofPOT;POT): atwo-bit2-bit binary field as defined inSection 3.2.3</t> <t><xref target="ioam-cap-res-cont"/>.</li> <li> Description: a terse description of the meaning of this SoPvalue</t> </list> </t>value.</li> </ul> <t> The registry initially contains the following value:</t><figure> <artwork><![CDATA[ SoP Description ---- ----------- 0b00 64-bit<table anchor="sop-description" align="center"> <name>SoP and Description</name> <thead> <tr> <th>SoP</th> <th>Description</th> </tr> </thead> <tbody> <tr> <td>0b00</td> <td>64-bit "PktID" and 64-bit "Cumulative"data ]]></artwork> </figure> <t> 0b01data</td> </tr> </tbody> </table> <t>0b01 - 0b11 are available for assignment via the IETF Review process as per <xref target="RFC8126"/>.</t> </section><section title="IOAM<section> <name>IOAM TSF CapabilityRegistry">Registry</name> <t> This registry defines4 code pointsfour codepoints for the IOAM TSF Capability field for identifying the timestamp format as explained inSection 5 of<xreftarget="RFC9197"/>.</t>target="RFC9197" sectionFormat="of" section="5"/>.</t> <t> A new entry in this registry requires the followingfields:<list style="symbols"> <t> TSF: timestamp format;fields:</t> <ul spacing="normal"> <li> TSF (TimeStamp Format): atwo-bit2-bit binary field as defined inSection 3.2.4</t> <t><xref target="ioam-e2e"/>.</li> <li> Description: a terse description of the meaning of this TSFvalue</t> </list> </t>value.</li> </ul> <t> The registry initially contains the following values:</t><figure> <artwork><![CDATA[ TSF Description ---- ----------- 0b00 PTP<table anchor="tsf-description" align="center"> <name>TSF and Description</name> <thead> <tr> <th>TSF</th> <th>Description</th> </tr> </thead> <tbody> <tr> <td>0b00</td> <td>PTP Truncated TimestampFormat 0b01 NTPFormat</td> </tr> <tr> <td>0b01</td> <td>NTP 64-bit TimestampFormat 0b10 POSIX-basedFormat</td> </tr> <tr> <td>0b10</td> <td>POSIX-based TimestampFormat ]]></artwork> </figure>Format</td> </tr> </tbody> </table> <t> 0b11 is available for assignment via the IETF Review process as per <xref target="RFC8126"/>.</t> </section> </section><section title="Security Considerations"><section> <name>Security Considerations</name> <t> Overall, the security needs for IOAM capabilities query mechanisms used in different environments are similar.</t> <t> To avoid potential Denial-of-Service (DoS) attacks, it isRECOMMENDED<bcp14>RECOMMENDED</bcp14> that implementations apply rate-limiting to incoming echo requests and replies.</t> <t> To protect against unauthorized sources using echo request messages to obtain IOAM Capabilities information, implementationsMUST<bcp14>MUST</bcp14> provide a means of checking the source addresses of echo request messages against an access list before accepting the message.</t> <t> A deploymentMUST<bcp14>MUST</bcp14> ensure thatborder filteringborder-filtering drops inbound echo requests with an IOAM Capabilities Container Header from outside of thedomain,domain and that drops outbound echorequest/repliesrequests or replies with IOAM Capabilities Headers leaving the domain.</t> <t> A deploymentMUST<bcp14>MUST</bcp14> support the configuration option toenable/disableenable or disable the IOAM Capabilities Discovery feature defined in this document. By default, the IOAM Capabilities Discovery featureMUST<bcp14>MUST</bcp14> be disabled.</t> <t> The integrity protection on IOAM Capabilities information carried in echo reply messages can be achieved by the underlying transport. For example, if the environment is an IPv6 network, the IP Authentication Header <xref target="RFC4302"/> or IP Encapsulating Security Payload Header <xref target="RFC4303"/> can be used.</t> <t> The collected IOAM Capabilities information by queries may be considered confidential. An implementation can use secure underlying transport of echorequest/replyrequests or replies to provide privacy protection. For example, if the environment is an IPv6 network, confidentiality can be achieved by using the IP Encapsulating Security Payload Header <xref target="RFC4303"/>.</t> <t> An implementation can also directly secure the data carried in echo requests and replies if needed, the specific mechanism on how to secure the data is beyond the scope of this document.</t> <t> An implementation can also check whether the fields in received echo requests and replies strictly conform to the specifications, e.g., whether the list of IOAM Namespace-IDs includes duplicateentries,entries and whether the received Namespace-ID is an operator-assigned or IANA-assigned one, once a check fails, an exception event indicating the checked field should be reported to the management.</t> <t> Except for what's described above, the security issues discussed in <xref target="RFC9197"/> provideagood guidance on implementation of this specification.</t> </section> </middle> <back> <displayreference target="I-D.ietf-sfc-multi-layer-oam" to="OAM-for-SFC"/> <displayreference target="I-D.ietf-bier-ping" to="BIER-PING"/> <references> <name>References</name> <references> <name>Normative References</name> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9197.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9326.xml"/> </references> <references> <name>Informative References</name> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8799.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4620.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4884.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8335.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8029.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml"/> <!-- [I-D.ietf-sfc-multi-layer-oam] IESG state Publication Requested. --> <reference anchor="I-D.ietf-sfc-multi-layer-oam"> <front> <title>Active OAM for Service Function Chaining (SFC)</title> <author initials="G." surname="Mirsky" fullname="Greg Mirsky"> <organization>Ericsson</organization> </author> <author initials="W." surname="Meng" fullname="Wei Meng"> <organization>ZTE Corporation</organization> </author> <author initials="T." surname="Ao" fullname="Ting Ao"> <organization>China Mobile</organization> </author> <author initials="B." surname="Khasnabish" fullname="Bhumip Khasnabish"> <organization>Individual contributor</organization> </author> <author initials="K." surname="Leung" fullname="Kent Leung"> <organization>Individual contributor</organization> </author> <author initials="G." surname="Mishra" fullname="Gyan Mishra"> <organization>Verizon Inc.</organization> </author> <date month="March" day="23" year="2023"/> </front> <seriesInfo name="Internet-Draft" value="draft-ietf-sfc-multi-layer-oam-23"/> </reference> <!-- [I-D.ietf-bier-ping] IESG state Expired.--> <xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-bier-ping.xml"/> </references> </references> <sectiontitle="Acknowledgements">numbered="false"> <name>Acknowledgements</name> <t> The authors would like to acknowledgeTianran Zhou, Dhruv Dhody, Frank Brockners, Cheng Li, Gyan Mishra, Marcus Ihlar, Martin Duke, Chris Lonvick, Eric Vyncke, Alvaro Retana, Paul Wouters, Roman Danyliw, Lars Eggert, Warren Kumari, John Scudder, Robert Wilton, Erik Kline, Zaheduzzaman Sarker and Murray Kucherawy<contact fullname="Tianran Zhou"/>, <contact fullname="Dhruv Dhody"/>, <contact fullname="Frank Brockners"/>, <contact fullname="Cheng Li"/>, <contact fullname="Gyan Mishra"/>, <contact fullname="Marcus Ihlar"/>, <contact fullname="Martin Duke"/>, <contact fullname="Chris Lonvick"/>, <contact fullname="Éric Vyncke"/>, <contact fullname="Alvaro Retana"/>, <contact fullname="Paul Wouters"/>, <contact fullname="Roman Danyliw"/>, <contact fullname="Lars Eggert"/>, <contact fullname="Warren Kumari"/>, <contact fullname="John Scudder"/>, <contact fullname="Robert Wilton"/>, <contact fullname="Erik Kline"/>, <contact fullname="Zaheduzzaman Sarker"/>, <contact fullname="Murray Kucherawy"/>, and <contact fullname="Donald Eastlake 3rd"/> for their careful review and helpful comments.</t> <t> The authors appreciate the f2f discussion withFrank Brockners<contact fullname="Frank Brockners"/> on this document.</t> <t> The authors would like to acknowledgeTommy Pauly and Ian Swett<contact fullname="Tommy Pauly"/> and <contact fullname="Ian Swett"/> for their good suggestion and guidance.</t> </section></middle> <back> <references title="Normative References"> <?rfc include="reference.RFC.2119"?> <?rfc include="reference.RFC.8174"?> <?rfc include="reference.RFC.8126"?> <?rfc include="reference.RFC.9197"?> <?rfc include="reference.RFC.9326"?> </references> <references title="Informative References"> <?rfc include="reference.RFC.8799"?> <?rfc include="reference.RFC.4443"?> <?rfc include="reference.RFC.4620"?> <?rfc include="reference.RFC.4884"?> <?rfc include="reference.RFC.8335"?> <?rfc include="reference.RFC.8029"?> <?rfc include="reference.RFC.4302"?> <?rfc include="reference.RFC.4303"?> <?rfc include="reference.I-D.ietf-sfc-multi-layer-oam"?> <?rfc include="reference.I-D.ietf-bier-ping"?> </references></back> </rfc>