<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE rfcSYSTEM "rfc2629.dtd"> <?rfc toc="yes" ?> <?rfc symrefs="yes" ?>[ <!ENTITY nbsp " "> <!ENTITY zwsp "​"> <!ENTITY nbhy "‑"> <!ENTITY wj "⁠"> ]> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-pce-local-protection-enforcement-11" number="9488" submissionType="IETF" category="std"updates="5440">consensus="true" updates="5440" obsoletes="" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3"> <front> <titleabbrev="Protection Enforcement">Localabbrev="Local Protection Enforcement inPCEP</title>PCEP">Local Protection Enforcement in the Path Computation Element Communication Protocol (PCEP)</title> <seriesInfo name="RFC" value="9488"/> <author fullname="Andrew Stone" initials="A." surname="Stone"> <organization>Nokia</organization> <address> <postal> <street>600 March Road</street> <city>Kanata</city> <region>Ontario</region> <code>K2K 2T6</code> <country>Canada</country> </postal> <email>andrew.stone@nokia.com</email> </address> </author> <author fullname="Mustapha Aissaoui" initials="M." surname="Aissaoui"> <organization>Nokia</organization> <address> <postal> <street>600 March Road</street> <city>Kanata</city> <region>Ontario</region> <code>K2K 2T6</code> <country>Canada</country> </postal> <email>mustapha.aissaoui@nokia.com</email> </address> </author> <author fullname="Samuel Sidor" initials="S." surname="Sidor"> <organization>Cisco Systems, Inc.</organization> <address> <postal><street>Eurovea<extaddr>Eurovea Central3.</street>3</extaddr> <street>Pribinova 10</street> <city>Bratislava</city> <code>811 09</code> <country>Slovakia</country> </postal> <email>ssidor@cisco.com</email> </address> </author> <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan"> <organization>CienaCoroporation</organization>Corporation</organization> <address> <postal> <street>385 Terry Fox Drive</street> <city>Kanata</city> <region>Ontario</region> <code>K2K 0L1</code> <country>Canada</country> </postal> <email>ssivabal@ciena.com</email> </address> </author> <date year="2023"month="June" day="23"/>month="October"/> <area>rtg</area> <workgroup>pce</workgroup> <keyword>segment routing</keyword> <keyword>adjacency sid</keyword> <keyword>sla</keyword> <keyword>fast reroute</keyword> <keyword>ti-lfa</keyword> <abstract> <t>This document updatesRFC5440RFC 5440 to clarify usage of thelocal protection desiredLocal Protection Desired bitsignalledsignaled in the Path Computation Element Communication Protocol (PCEP). This document also introduces a new flag forsignallingsignaling protectionstrictnessenforcement in PCEP.</t> </abstract> </front> <middle> <sectiontitle="Introduction"anchor="introduction"toc="default">toc="default" numbered="true"> <name>Introduction</name> <t>The Path Computation Element(PCE)Communication Protocol (PCEP) <xref target="RFC5440"/>format="default"/> enables the communication between a Path Computation Client (PCC) and aPCE,PCE or between two PCEs based on the PCE architecture <xref target="RFC4655"/>.format="default"/>. </t> <t>PCEP <xref target="RFC5440"/>format="default"/> utilizes flags,valuesvalues, and concepts previously defined in RSVP-TE Extensions <xref target="RFC3209"/>format="default"/> and Fast Reroute Extensions to RSVP-TE <xref target="RFC4090"/>.format="default"/>. One such concept in PCEP is the'LocalLocal ProtectionDesired' (LDesired (L) flag in theLSPA ObjectLSP Attributes (LSPA) object in <xref target="RFC5440"/>),format="default"/>, which was originally defined in theSESSION-ATTRIBUTE ObjectSession Attribute object inRFC3209.<xref target="RFC3209" format="default"/>. In RSVP, this flag signals to downstream routers that they may use a local repair mechanism. The headend router calculating the path does not knowwhetherif a downstream router will or will not protect a hop during its calculation. Therefore,a local protection desiredthe L flag does not require the transit router to satisfy protection in order to establish theRSVP signalledRSVP-signaled path. This flag issignalledsignaled in PCEP as an attribute of theLSPLabel Switched Path (LSP) via theLSP AttributesLSPA object. </t> <t>PCEP Extensions for Segment Routing(<xref<xref target="RFC8664"/>)format="default"/> extends support in PCEP for SegmentRoutedRouting paths. The path list is encoded with SegmentIdentifiers,Identifiers (SIDs), each of which might offer local protection. The PCE may discover the protection eligibility for aSegment Identifier (SID)SID viaBGP-LSthe Border Gateway Protocol - Link State (BGP-LS) <xref target="RFC9085"/>format="default"/> and take the protection into consideration as a path constraint. </t> <t>It is desirable for an operator to be able to define theenforcement, or strictnessenforcement of the protection requirement. </t> <t>This document updates <xref target="RFC5440"/>format="default"/> by further describing thebehaviour withbehavior of the Local Protection DesiredFlag (L flag)(L) flag and extends on it with the introduction of the Protection EnforcementFlag (E flag).</t>(E) flag.</t> <t>The document containsreference notes fordescriptions in the context of SegmentRouting, howeverRouting; however, the content described is agnostic in regard to path setup type and data planetechnology agnostic.</t>technology.</t> </section> <sectiontitle="Requirements Language" anchor="requirements-language"> <t>Theanchor="requirements-language" numbered="true" toc="default"> <name>Requirements Language</name> <t> The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described inBCP 14BCP 14 <xreftarget="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/>target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shownhere.</t>here. </t> </section> <sectiontitle="Terminology" anchor="terminology">anchor="terminology" numbered="true" toc="default"> <name>Terminology</name> <t>This document uses the following terminology:</t><t> PROTECTION MANDATORY: The Path MUST<dl newline="false" spacing="normal"> <dt>PROTECTION MANDATORY:</dt><dd>The path <bcp14>MUST</bcp14> have protection eligibility on alllinks.</t> <t> UNPROTECTED MANDATORY: The Path MUST NOTlinks.</dd> <dt>UNPROTECTED MANDATORY:</dt><dd>The path <bcp14>MUST NOT</bcp14> have protection eligibility on alllinks.</t> <t> PROTECTION PREFERRED: The Pathlinks.</dd> <dt>PROTECTION PREFERRED:</dt><dd>The path should have protection eligibility on all links but might contain linkswhichthat do not have protectioneligibility.</t> <t> UNPROTECTED PREFERRED: The Patheligibility.</dd> <dt>UNPROTECTED PREFERRED:</dt><dd>The path should not have protection eligibility on all links but might contain linkswhichthat have protectioneligibility.</t> <t> PCC: Patheligibility.</dd> <dt>PCC:</dt><dd>Path Computation Client. Any client application requesting a path computation to be performed by a Path ComputationElement.</t> <t> PCE: PathElement.</dd> <dt>PCE:</dt><dd>Path Computation Element. An entity (component, application, or network node) that is capable of computing a network path or route based on a network graph and applying computationalconstraints.</t> <t> PCEP: Pathconstraints.</dd> <dt>PCEP:</dt><dd>Path Computation ElementProtocol.</t> <t> LSPA: LSPCommunication Protocol</dd> <dt>LSPA:</dt><dd>LSP AttributesObject in PCEP, defined in RFC5440</t>object <xref target="RFC5440" format="default"/></dd> </dl> </section> <sectiontitle="Motivation"anchor="motivation"toc="default">toc="default" numbered="true"> <name>Motivation</name> <sectiontitle="Implementation differences"anchor="implementation-differences"toc="default">toc="default" numbered="true"> <name>Implementation Differences</name> <t>As defined in <xref target="RFC5440"/>format="default"/>, the mechanism to signal protection enforcement in PCEP is the previously mentioned L flag defined in the LSPAObject.object. The name of the flag uses the term "Desired", which by definition means "strongly wished for orintended" and theintended". The use case for this flag originatedfrom thein RSVP. ForRSVP signalledRSVP-signaled paths, local protection is not within control of the PCE. However, <xref target="RFC5440"/>format="default"/> does state"Whenthat "[w]hen set, this means that the computed path must include links protected with Fast Reroute as defined in[RFC4090]."<xref target="RFC4090" />." Implementationsofthat use PCEP <xref target="RFC5440"/>format="default"/> haveeitherinterpreted the L flag as either PROTECTION MANDATORY or PROTECTION PREFERRED, leading to operational differences. </t> </section> <sectiontitle="SLA Enforcement"anchor="sla-enforcement"toc="default">toc="default" numbered="true"> <name>SLA Enforcement</name> <t> Theboolean bitL flag is a boolean bit and thus unable to distinguish between the different options of PROTECTION MANDATORY, UNPROTECTED MANDATORY, PROTECTIONPREFERREDPREFERRED, and UNPROTECTED PREFERRED. Selecting one ofthethese options is typically dependent on theservice level agreementService Level Agreement (SLA) the operator wishes to impose on the LSP. A network may be providing transit to multipleservice agreementSLA definitions against the same base topology network, whose behavior could vary, such as wanting local protection to be invoked on some LSPs and not wanting local protection on others. When enforcement is used, the resulting shortest path calculation is impacted.</t> <t> For example, PROTECTION MANDATORY is for use caseswherein which an operator may need the LSP to follow a pathwhichthat has local protection provided along the full path, ensuring that traffic will be fast rerouted at the point if there is a failure anywhere along thepath that traffic will be fast re-routed at the point.path. </t> <t>ForAs another example, UNPROTECTED MANDATORY iswhenfor use cases in which an operator may intentionally prefer an LSP to not be locallyprotected,protected and thus would rather local failures cause the LSP to go down. An example scenario is one where an LSP is protectedwith path protectionvia a secondary diverse LSP. Each LSP is traffic engineered to follow specifictraffic engineeredtraffic-engineered criteria computed by the PCE to satisfy the SLA. Upon a failure, if local protection is invoked on the active LSP traffic, the traffic may temporarily traverse linkswhichthat violate the TE requirements and could negatively impact the resources being traversed (e.g., insufficient bandwidth). In addition, depending on the network topological scenario, it maybenot be feasible for the PCE to reroute the LSP while respecting the TErequirementsrequirements, which include pathdiversity, resultingdiversity; this results in the LSP being torn down and switched to the protected path anyways. In suchscenarios itsscenarios, it is desirable for the LSP to be simply torn down immediately and notre-routedrerouted through local protection, so that traffic may be forwarded through analready establishedalready-established traffic-engineered secondary path. </t> <t> Both the UNPROTECTED PREFERRED and PROTECTED PREFERRED options provide a relaxation of the protection constraint. These options can be used when an operator does not require protection enforcement. Regardless of the option selected, the protection status of a resource does not influence whether the link must be pruned during a path calculation. Furthermore, the selection of either option indicates a priority selection to the PCE when there is an option to choose a protected or unprotected instruction associated with a resource, ensuring consistent PCE behavior across different implementations. </t> <t>When used with Segment Routing, an adjacency may have both a protected SID and an unprotected SID. If the UNPROTECTED PREFERRED option is selected, the PCE chooses the unprotected SID. Alternatively, if the PROTECTED PREFERRED option is selected, the PCE chooses the protectedSIDSID. </t> </section> </section> <sectiontitle="Protectionanchor="protection-enforcement-flag--e-flag-" toc="default" numbered="true"> <name>Protection Enforcement Flag (Eflag)" anchor="protection-enforcement-flag--e-flag-" toc="default"> <t>Section 7.11 in Path Computation Element Protocol <xrefFlag)</name> <t><xref target="RFC5440"/>section="7.11" sectionFormat="of"></xref> describes the encoding of the Local Protection Desired(L flag). A(L) flag. The Protection Enforcementflag "E" is specified below, extending(E) flag, which extends the Lflag.</t> <t>[RFC Editor Note: The text below assumes the E bit remains the early allocation value 6. Please adjust if this changes and remove this note before publication.]</t> <figure> <artwork><![CDATA[Codespaceflag, is specified below.</t> <table anchor="flagfieldtable" align="left"> <name>Codespace of the FlagfieldField (LSPAObject) Bit Description Reference 7 Local Protection Desired RFC5440 6 LocalObject)</name> <thead> <tr> <th>Bit</th> <th>Description</th> <th>Reference</th> </tr> </thead> <tbody> <tr> <td>6</td> <td>Protection Enforcement</td> <td>RFC 9488</td> </tr> <tr> <td>7</td> <td>Local ProtectionEnforcement This document]]></artwork> </figure>Desired</td> <td>RFC 5440</td> </tr> </tbody> </table> <t>The following shows the format of the LSPAObjectobject as defined in <xref target="RFC5440"/> is:</t> <figure> <artwork><![CDATA[format="default"/> with the addition of the E flag defined in this document:</t> <artwork name="" type="" align="left" alt=""><![CDATA[ 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Exclude-any | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Include-any | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Include-all | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Setup Prio | Holding Prio | Flags |E|L| Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // Optional TLVs // | |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+]]></artwork> </figure> <t> Flags+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ]]></artwork> <dl newline="true" spacing="normal"> <dt>Flags (8bits)</t> <t> <list style="symbols"> <t> L Flag: Asbits):</dt><dd> <dl newline="false" spacing="normal"> <dt>L (Local Protection Desired):</dt><dd>This flag is defined in <xref target="RFC5440"/>format="default"/> and further updated by this document. When set to 1, protection is desired. When set to 0, protection is not desired. The enforcement of the protection is identified via the Eflag. </t> <t>E Flagflag.</dd> <dt>E (ProtectionEnforcement): ThisEnforcement):</dt><dd>This flag controls the strictnessinwith which the PCE must apply the L flag. When set to 1, the value of the L flag needs to be respected during resource selection by the PCE. When the E flag is set to 0, an attempt to respect the value of the L flag is made; however, the PCE could relax or ignore the L flag when computing a path. The statements below indicate preference when the E flag is set to 0 in combination with the L flagvalue.</t> </list> </t>value. </dd> </dl> </dd> </dl> <t>When both the L flag and E flag are set to 1, then the PCEMUST<bcp14>MUST</bcp14> consider the protection eligibility as a PROTECTION MANDATORY constraint.</t> <t>When the L flag is set to 1 and the E flag is set to 0, then the PCEMUST<bcp14>MUST</bcp14> consider the protection eligibility as a PROTECTION PREFERRED constraint.</t> <t> When both the L flag and E flag are set to 0, then the PCESHOULD<bcp14>SHOULD</bcp14> consider the protection eligibility as an UNPROTECTED PREFERRED constraint butMAY<bcp14>MAY</bcp14> consider the protection eligibility as an UNPROTECTED MANDATORY constraint. An example of when the latter behavior might be chosen is if the PCE has some means (outside the scope of this document) to detect that it is interacting with a legacy PCC that expects the legacy behavior.</t> <t>When the L flag is set to 0 and the E flag is set to 1, then the PCEMUST<bcp14>MUST</bcp14> consider the protection eligibility as an UNPROTECTED MANDATORY constraint.</t> <t> If a PCE is unable to infer the protection status of a resource, the PCEMAY<bcp14>MAY</bcp14> use local policy to define protected status assumptions. When computing a SegmentRoutedRouting path,Itit isRECOMMENDED<bcp14>RECOMMENDED</bcp14> that a PCE assume a Node SID is protected. It is alsoRECOMMENDED<bcp14>RECOMMENDED</bcp14> that a PCE assume an Adjacency SID is protected if the backup flag advertised with the Adjacency SID is set. </t> <sectiontitle="Backwards Compatibility"anchor="compatibility"toc="default"> <t>Considerationstoc="default" numbered="true"> <name>Backwards Compatibility</name> <t>This section outlines considerations for the E flag bit in the message passing between the PCC and the PCEfor the E flag bit whichthat are not supported by theentity are outlined in this section, withentity. The requirements for the PCE and the PCC implementing this document are described at the end.</t> <t>For a PCC or PCEwhichthat does not yet support this document, the E flag is ignored and set tozero0 in PCRpt and/or PCUpd messages as per <xref target="RFC5440"/>format="default"/> for PCC-initiated LSPs or as per <xref target="RFC8281"/>format="default"/> for PCE-initiated LSPs. It is important to note that <xref target="RFC8231"/>format="default"/> and <xref target="RFC8281"/>format="default"/> permit theLSP Attribute ObjectLSPA object <xref target="RFC5440" format="default"/> to be included in PCUpd messages for PCC-initiated and PCE-initiated LSPs. </t> <t> For PCC-initiated LSPs,PCUpdthe E flag (and L flag) in a PCUpd message is an echo from the previous PCRpthowevermessage; however, the bit value is ignored on the PCE from the previousPCRpt, thereforePCRpt message, so the E flag value set in the PCUpd message iszero.0. A PCEwhichthat does not support this document sends PCUpd messages with the E flag set to 0 forPCC-initatedPCC-initiated LSPs even if set to 1 in the prior PCReq orPCRpt.PCRpt message. </t> <t> A PCCwhichthat does not support this document sends PCRpt messages with the E flag set to 0 for PCE-initiated LSPs even if set to 1 in the prior PCInitiate orPCUpd.PCUpd message. </t> <t>For a PCCwhichthat does support this document,it MAY setthe E flag <bcp14>MAY</bcp14> be set to 1 depending on local configuration. If communicating with a PCEwhichthat does not yet support this document, the PCE follows thebehaviourbehavior specified in <xref target="RFC5440"/>format="default"/> andwill ignoreignores the E flag. Thus, a computed path might not respect the enforcement constraint.</t> <t>For PCC-initiated LSPs, the PCCSHOULD<bcp14>SHOULD</bcp14> ignore the E flag value received from the PCE in a PCUpd message as it may be communicating with a PCEwhichthat does not support this document.</t> <t>For PCE-initiated LSPs, the PCCMAY<bcp14>MAY</bcp14> process the E flag value received from the PCE in a PCUpd message. The PCESHOULD<bcp14>SHOULD</bcp14> ignore the E flag value received from the PCC in a PCRpt message as it may be communicating with a PCCwhichthat does not support this document. </t> </section> </section> <sectionanchor="Imp" title="Implementation Status" toc="default"> <t>[Note to the RFC Editor - remove this section before publication, as well as remove the reference to RFC 7942.]</t> <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalogue of available implementations or their features. Readers are advised to note that other implementations may exist.</t> <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit".</t> <section title="Nokia Implementation" toc="default"> <t> <list style="symbols"> <t>Organization: Nokia</t> <t>Implementation: NSP PCE and SROS PCC.</t> <t>Description: Implementation for calculation and conveying intention described in this document</t> <t>Maturity Level: Demo</t> <t>Coverage: Full</t> <t>Contact: andrew.stone@nokia.com </t> </list> </t> </section> <section title="Cisco Implementation" toc="default"> <t> <list style="symbols"> <t>Organization: Cisco Systems, Inc.</t> <t>Implementation: IOS-XR PCE and PCC.</t> <t>Description: Implementation for calculation and conveying intention described in this document</t> <t>Maturity Level: Demo</t> <t>Coverage: Full</t> <t>Contact: ssidor@cisco.com </t> </list> </t> </section> </section> <section title="Security Considerations"anchor="security-considerations"toc="default">toc="default" numbered="true"> <name>Security Considerations</name> <t>This document clarifies thebehaviourbehavior of an existing flag and introduces a new flag to provide further control of that existingbehaviour.behavior. The introduction of this new flag andbehaviourthe behavior clarificationdoesdo not create any new sensitive information. No additional security measure is required.</t> <t>Securing the PCEP session using Transport Layer Security (TLS) <xref target="RFC8253"/>,format="default"/>, as per the recommendations and best current practices in <xref target="RFC9325"/>format="default"/>, isRECOMMENDED.</t><bcp14>RECOMMENDED</bcp14>.</t> </section> <sectiontitle="IANA Considerations"anchor="iana-considerations"toc="default"> <t>[RFC Editor Note: The text below assumes the E bit remains the early allocation value 6. Please adjust if this changes and remove this note before publication.]</t>toc="default" numbered="true"> <name>IANA Considerations</name> <t>This document defines a new bit value in thesub-registrysubregistry "LSPA Object Flag Field" in the "Path Computation Element Protocol (PCEP) Numbers" registry. IANA has made the following codepoint allocation.</t><figure> <artwork> <![CDATA[ Bit Name Reference 6 Protection Enforcement This document]]> </artwork> </figure><table anchor="prot-enforce-iana-table" align="left"> <name>Addition to LSPA Object Flag Field Registry</name> <thead> <tr> <th>Bit</th> <th>Description</th> <th>Reference</th> </tr> </thead> <tbody> <tr> <td>6</td> <td>Protection Enforcement</td> <td>RFC 9488</td> </tr> </tbody> </table> </section> </middle> <back><references title="Normative References"> <?rfc include="reference.RFC.2119.xml" ?> <?rfc include="reference.RFC.8174.xml" ?> <?rfc include="reference.RFC.5440.xml" ?> <?rfc include="reference.RFC.3209.xml" ?> <?rfc include="reference.RFC.4090.xml" ?> <?rfc include="reference.RFC.8253.xml" ?> <?rfc include="reference.RFC.8231.xml" ?> <?rfc include="reference.RFC.8281.xml" ?> <?rfc include="reference.RFC.9325.xml" ?><references> <name>References</name> <references> <name>Normative References</name> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5440.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3209.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4090.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8253.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8231.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8281.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9325.xml"/> </references> <references> <name>Informative References</name> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4655.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8664.xml"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9085.xml"/> </references><references title="Informative References"> <?rfc include="reference.RFC.4655.xml" ?> <?rfc include="reference.RFC.7942.xml" ?> <?rfc include="reference.RFC.8664.xml" ?> <?rfc include="reference.RFC.9085.xml" ?></references> <sectiontitle="Acknowledgements"anchor="Acknowledgements" numbered="false" toc="default"> <name>Acknowledgements</name> <t>Thanks toDhruv Dhody, Mike Koldychev, and John Scudder<contact fullname="Dhruv Dhody"/>, <contact fullname="Mike Koldychev"/>, and <contact fullname="John Scudder"/> for reviewing and providing very valuable feedback and discussions on this document.</t> <t>Thanks toJulien Meuric<contact fullname="Julien Meuric"/> for shepherding this document. </t> </section> </back> </rfc>