Routing area

Internet Engineering Task Force (IETF)                     D. Rathi, Ed.
Internet-Draft
Request for Comments: 9655                                         Nokia
Intended status:
Category: Standards Track                                  S. Hegde, Ed.
Expires: 14 December 2024
ISSN: 2070-1721                                    Juniper Networks Inc.
                                                                K. Arora
                                                  Individual Contributor
                                                                  Z. Ali
                                                               N. Nainar
                                                     Cisco Systems, Inc.
                                                            12 June
                                                           November 2024

Egress Validation in Label Switched Path Ping and Traceroute Mechanisms
               draft-ietf-mpls-egress-tlv-for-nil-fec-15

Abstract

   The MPLS ping and traceroute mechanisms, as mechanisms described in [RFC8029] RFC 8029 and the
   related extensions for Segment Routing (SR) defined in
   [RFC8287], is RFC 8287 are
   highly valuable for validating control plane and data plane
   synchronization.  In certain environments, only some intermediate or
   transit nodes may have been upgraded to support these validation
   procedures.  A straightforward MPLS ping and traceroute mechanism
   allows traversing traversal of any path without validating validation of the control plane
   state.  [RFC8029]  RFC 8029 supports this mechanism with the Nil Forwarding
   Equivalence Class (FEC).  The procedures outlined in
   [RFC8029] is RFC 8029 are
   primarily applicable when the Nil FEC is used as an intermediate FEC
   in the label FEC stack.  However, challenges arise when all labels in the
   label stack are represented using the Nil FEC.

   This document introduces a new Type-Length-Value (TLV) as an
   extension to the existing Nil FEC.  It describes MPLS ping and
   traceroute procedures using the Nil FEC with this extension to
   address and overcome these challenges.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list  It represents the consensus of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid the IETF community.  It has
   received public review and has been approved for a maximum publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of six months RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be updated, replaced, or obsoleted by other documents obtained at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 14 December 2024.
   https://www.rfc-editor.org/info/rfc9655.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info)
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Requirements Language
   2.  Problem with Nil FEC  . . . . . . . . . . . . . . . . . . . .   4
   3.  Egress TLV  . . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Procedure . . . . . . . . . . . . . . . . . . . . . . . . . .   6
     4.1.  Sending Egress TLV in MPLS Echo Request . . . . . . . . .   6
       4.1.1.  Ping Mode . . . . . . . . . . . . . . . . . . . . . .   6
       4.1.2.  Traceroute Mode . . . . . . . . . . . . . . . . . . .   7
       4.1.3.  Detailed Example  . . . . . . . . . . . . . . . . . .   7
     4.2.  Receiving Egress TLV in MPLS Echo Request . . . . . . . .   8
   5.  Backward Compatibility  . . . . . . . . . . . . . . . . . . .   9
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
     6.1.  New TLV . . . . . . . . . . . . . . . . . . . . . . . . .   9
     6.2.  New Return code . . . . . . . . . . . . . . . . . . . . .   9 Code
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  10
   8.  Implementation Status . . . . . . . . . . . . . . . . . . . .  10
     8.1.  Juniper Networks  . . . . . . . . . . . . . . . . . . . .  10
   9.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  11
   10.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     10.1.
     8.1.  Normative References . . . . . . . . . . . . . . . . . .  11
     10.2.
     8.2.  Informative References . . . . . . . . . . . . . . . . .  12
   Acknowledgements
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   Segment routing supports the creation of explicit paths by using one
   or more Link State Link-State IGP Segments or BGP Segments defined in [RFC8402].
   In certain use cases, the TE paths are built using mechanisms
   described in [RFC9256] by stacking the labels that represent the
   nodes and links in the explicit path.  Controllers are often deployed
   to construct paths across multi-domain networks.  In such
   deployments, the head-end headend routers may have the link state link-state database of
   its
   their domain and may not be aware of the FEC associated with labels
   that are used by the controller to build paths across multiple
   domains.  A very useful Operations, Administration, and Maintenance
   (OAM) requirement is to be able to ping and trace these paths.

   [RFC8029] describes a simple and efficient mechanism to detect data- data
   plane failures in MPLS Label Switched Paths (LSPs).  It defines a
   probe message called an "MPLS echo request" and a response message
   called an "MPLS echo reply" for returning the result of the probe.
   SR-related extensions to Echo Request/Echo Reply for these are specified in [RFC8287].
   [RFC8029] primarily provides mechanisms primarily to validate the data plane and, secondarily,
   and secondarily to verify the consistency of the data plane with the
   control plane.  It also provides the ability to traverse Equal-cost Multiple Paths (ECMP) Equal-Cost
   Multipaths (ECMPs) and validate each of the ECMP paths.  The Target
   FEC Stack TLV [RFC8029] contains sub-TLVs that carry information
   about the label.  This information gets validated on each node for
   traceroute and on the egress for ping.  The use of the Target FEC
   Stack TLV requires all nodes in the network to have implemented the
   validation procedures.  All procedures, but all intermediate nodes may not have been
   upgraded to support validation procedures.  In such cases, it is
   useful to have the ability to traverse the paths in ping/traceroute
   mode without having to obtain the FEC for each label.

   A simple MPLS Echo Request/Echo Reply echo request/reply mechanism allows for traversing the
   SR Policy path without validating the control plane state.  [RFC8029]
   supports this mechanism with FECs like the Nil FEC and the Generic
   FEC.
   FECs (i.e., Generic IPv4 prefix and Generic IPv6 prefix).  However,
   there are challenges in reusing the Generic FEC and Nil FEC and Generic FECs for
   validation of SR policies Policies [RFC9256].  The Generic IPv4 prefix and
   Generic IPv6 prefix FECs are used when the protocol that is
   advertising the label is unknown.  The information that is carried in
   the Generic FEC FECs is the IPv4 or IPv6 prefix and prefix length.  Thus  Thus,
   the Generic FEC types perform an additional control plane validation.
   However, the details of Generic FEC FECs and relevant validation procedures are not
   very
   thoroughly detailed in the [RFC8029].  The use-case use case mostly specifies inter-
   AS
   inter-AS (Autonomous System) VPNs as the motivation.  Certain aspects
   of SR SR, such as anycast
   SIDs Segment Identifiers (SIDs), require clear
   guidelines on how the validation procedure should work.  Also, the
   Generic FEC FECs may not be widely supported supported, and if transit routers are
   not upgraded to support validation of Generic FEC, FECs, traceroute may
   fail.  On the other hand, the Nil FEC consists of the
   label label, and
   there is no other associated FEC information.  The Nil FEC is used to
   traverse the path without validation for cases where the FEC is not
   defined or routers are not upgraded to support the FECs.  Thus, it
   can be used to check any combination of segments on any data path.
   The procedures described in [RFC8029] are mostly applicable when the
   Nil FEC is used where the Nil FEC is as an intermediate FEC in the
   label FEC stack.  When  Challenges
   arise when all labels in the label-stack is label stack are represented using the
   Nil FEC, it poses some challenges. FEC.

   Section 2 discusses the problems associated with using the Nil FEC in
   an MPLS ping/traceroute procedure procedure, and Section Sections 3 and Section 4 discuss
   simple extensions needed to solve the problem.

   The problems and the solutions described in this document apply to
   the MPLS data plane.  SRv6  Segment Routing over IPv6 (SRv6) is out-of-scope out of
   scope for this document.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Problem with Nil FEC

   The purpose of the Nil FEC FEC, as described in [RFC8029] [RFC8029], is to ensure hiding
   of
   that transit tunnel information and is hidden and, in some cases cases, to
   avoid false negatives when the FEC information is unknown.

   This document uses a Nil FEC to represent the complete label stack in
   an MPLS Echo Request echo request message in ping and traceroute mode.  A single
   Nil FEC is used in the MPLS Echo Request echo request message irrespective of the
   number of segments in the label stack.  As described in sec  Section 4.4.1 of
   [RFC8029], "If [RFC8029]
   notes:

   |  If the outermost FEC of the Target FEC stack is the Nil FEC, then
   |  the node MUST skip the Target FEC validation completely." completely.

   When a router in the label-stack label stack path receives an MPLS Echo Request echo request
   message, there is no definite way to decide whether it is the
   intended egress router since the Nil FEC does not carry any
   information and no validation is performed by the router.  So  Thus,
   there is a high possibility that the packet may be mis-forwarded misforwarded to an
   incorrect destination but the MPLS Echo Reply echo reply might still return
   success.

   To mitigate this issue, it is necessary to include additional
   information
   information, along with the Nil FEC, in the MPLS Echo Request echo request message
   in both ping and traceroute modes, along with the Nil FEC, modes and to perform minimal validation
   on the egress/destination router.  This will enable the router to
   send appropriate success and failure information to the headend
   router of the SR Policy.  This supplementary information should
   assist in reporting transit router details to the headend router,
   which can be utilized by an offline application to validate the
   traceroute path.

   Consequently, the inclusion of egress information in the MPLS Echo
   Request echo
   request messages in ping and traceroute modes will facilitate the
   validation of the Nil FEC on the egress router router, ensuring the correct
   destination.  It  Egress information can be employed to verify any
   combination of segments on any path without requiring upgrades to
   transit nodes.  The code point used for Egress TLV is from the range 32768-65535 and can be silently dropped if not recognized as per [RFC8029] and as per
   clarifications from [RFC9041].  Alternately, the un-recognized TLV
   recognized; alternately, it may be stepped over over, or an error message
   may be sent. sent (per [RFC8029] and the clarifications in [RFC9041]
   regarding code points in the range 32768-65535).

   If a transit node does not recognize the Egress TLV and chooses to
   silently drop or step over the Egress TLV, the headend will continue
   to send the Egress TLV in the next echo request message message, and if
   egress recognizes the Egress TLV, egress validation will be executed
   at the egress.  If a transit node does not recognize the Egress TLV
   and chooses to send an error message, the headend will log the
   message for informational purposes and continue to send echo requests
   with the Egress TLV, with the TTL incremented.  If the egress node
   does not recognize the Egress TLV and chooses to silently drop or
   step over the Egress TLV, egress validation will not be done done, and the ping/
   traceroute
   ping/traceroute procedure will proceed as if the Egress TLV is were not
   received.

3.  Egress TLV

   The Egress TLV MAY be included in an MPLS Echo Request echo request message.  It
   is an optional TLV and, if present, MUST appear before the Target FEC stack
   Stack TLV in the MPLS Echo Request echo request packet.  This TLV can only be used
   in LSP ping/traceroute requests, requests that are generated by the head-end headend
   node of an LSP or SR policy Policy for which verification is performed.  In
   cases where multiple Nil FECs are present in the Target FEC Stack
   TLV, the Egress TLV must be added corresponding to the ultimate
   egress of the label stack.  Explicit paths can be created using Node-SID, Node-
   SID, Adj-SID,
   Binding-SID, Binding SID, etc.  The address Address field of the Egress TLV
   must be derived from the path egress/destination.  The format is as
   specified
   below: in Figure 1.

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |      Type = 32771 (Egress TLV)  |          Length             |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |                      Address (4 or 16 octets)                 |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                            Figure 1: Egress TLV

   Type :

   Type:  32771 (Section 6.1)
   Length : variable based on IPV4/IPV6 address.

   Length:  Variable (4 octets for IPv4 addresses and 16 octets for IPv6
      addresses).  Length excludes the length of the Type and Length
      fields.  Length will be 4 octets for
   IPv4 and 16 octets for IPv6.

   Address :

   Address:  This field carries a valid 4-octet IPv4 address of length 4 octets or a valid
      16-octet IPv6 address.  The address of length 16 octets.  It can be obtained from the
      egress of the path.  It path and corresponds to the last label in the label
      stack or the SR policy endpoint Policy Endpoint field
   [I.D-ietf-idr-sr-policy-safi]. [SR-POLICY-BGP].

4.  Procedure

   This section describes aspects of LSP ping and traceroute operations
   that require further considerations beyond those detailed in
   [RFC8029].

4.1.  Sending Egress TLV in MPLS Echo Request

   As previously mentioned, when the sender node constructs an Echo
   Request echo
   request with a Target FEC Stack TLV, the Egress TLV, if present, MUST
   appear before the Target FEC Stack TLV in the MPLS Echo Request echo request
   packet.

4.1.1.  Ping Mode

   When the sender node constructs an Echo Request echo request with target a Target FEC
   Stack TLV that contains a single Nil FEC corresponding to the last
   segment of the SR Policy path, the sender node MUST add an Egress TLV
   with the address obtained from the SR policy endpoint Policy Endpoint field
   [I.D-ietf-idr-sr-policy-safi].
   [SR-POLICY-BGP].  The Label value in the Nil FEC MAY be set to zero
   when a single Nil FEC is added for multiple labels in the label
   stack.  In case the endpoint is not specified or is equal to zero (Sec
   (Section 8.8.1 of [RFC9256]), the sender MUST use the address
   corresponding to the last segment of the SR Policy in the address Address
   field for of the Egress TLV.  Some specific cases on how to derive the
   address
   Address field in the Egress TLV are listed below:

      a.

   *  If the last SID in the SR policy Policy is an Adj-SID, the address Address field
      in the Egress TLV is derived from the node at the remote end of
      the corresponding adjacency.

      b.

   *  If the last SID in the SR policy Policy is a Binding SID, the address Address
      field in the Egress TLV is derived from the last node of the path
      represented by the Binding SID.

4.1.2.  Traceroute Mode

   When the sender node builds an Echo Request echo request with target a Target FEC Stack
   TLV that contains a Nil FEC corresponding to the last segment of the
   segment-list
   segment list of the SR Policy, the sender node MUST add an Egress TLV
   with the address obtained from the SR policy endpoint Policy Endpoint field
   [I.D-ietf-idr-sr-policy-safi].
   [SR-POLICY-BGP].

   Although there is no requirement to do so, an implementation MAY send
   multiple Nil FECs if that makes it easier for the implementation.  In
   case  If
   the SR Policy headend sends multiple Nil FECs FECs, the last one MUST
   correspond to the Egress TLV.  The Label value in the Nil FEC MAY be
   set to zero for the last Nil FEC.  In case  If the endpoint is not specified
   or is equal to zero (Sec (Section 8.8.1 of [RFC9256]), the sender MUST use
   the address corresponding to the last segment endpoint of the SR
   Policy path i.e. (i.e., the ultimate egress is used as the address for in the
   Egress TLV. TLV).

4.1.3.  Detailed Example

                     ----R3----
                    /  (1003)  \
         (1001)    /            \(1005)     (1007)
           R1----R2(1002)        R5----R6----R7(address X)
                   \            /     (1006)
                    \   (1004) /
                     ----R4----

             Figure 2: Egress TLV processing on sample topology Processing in Sample Topology

   Consider the SR Policy configured on router R1, R1 to destination X,
   configured with label-stack label stack as 1002, 1004, 1007.  Segment 1007
   belongs to R7, which has the address X locally configured on it.

   Let us look at an example of a ping Echo Request echo request message.  The Echo
   Request echo
   request message contains a Target FEC stack Stack TLV with the Nil FEC sub-
   TLV.  An Egress TLV is added before the Target FEC Stack TLV.  The
   address
   Address field contains X (corresponding to a locally configured
   address on R7).  X could be an IPv4 or IPv6 address address, and the Length
   field in the Egress TLV will be either 4 or 16 octets, based on the
   address X's type of address type. X.

   Let us look at an example of an Echo Request echo request message in a traceroute
   packet.  The Echo Request echo request message contains a Target FEC stack Stack TLV
   with the Nil FEC sub-TLV corresponding to the complete label-stack label stack
   (1002, 1004, 1007).  An Egress TLV is added before the Target FEC
   Stack TLV.  The address Address field contains X (corresponding to a locally
   configured address on destination R7).  X could be an IPv4 or IPv6
   address
   address, and the Length field in the Egress TLV will be either 4 or
   16 octets, based on the address X's type of address type. X.  If the
   destination/endpoint is set to zero (as in the case of the color-only
   SR Policy) Policy), the sender should use the endpoint of segment 1007 (the
   last segment in the segment list) as an the address for the Egress TLV.

4.2.  Receiving Egress TLV in MPLS Echo Request

   Any node that receives the an MPLS Echo Request echo request message and processes
   it, it
   is referred to as the "receiver".  In the case of the ping procedure,
   the actual destination/egress is the receiver.  In the case of
   traceroute, every node is a receiver.  This document does not propose
   any change in the processing for of the Nil FEC as (as defined in [RFC8029] [RFC8029])
   in the Target FEC stack TLV Node node that receives an MPLS echo request. request with a Target FEC
   Stack TLV.  The presence of the Egress TLV does not affect the
   validation of the Target FEC Stack sub-TLV at FEC-stack-depth if it
   is different than Nil FEC.

   Additional processing MUST be done for the Egress TLV on the receiver
   node as follows: follows.  Note that <RSC> refers to the Return Subcode.

   1.  If the Label-stack-depth is greater than 0 and the Target FEC
       Stack sub-TLV at FEC-stack-depth is Nil FEC, set Best-return-code
       to 8 ("Label switched at stack-depth") stack-depth <RSC>") and Best-return-subcode Best-rtn-subcode
       to Label-
   stack-depth Label-stack-depth to report transit switching in the MPLS Echo Reply echo
       reply message.

   2.  If the Label-stack-depth is 0 and the Target FEC Stack sub-TLV at
       FEC-stack-depth is Nil FEC FEC, then do the a lookup for an exact match
       of the Address field of the Egress TLV address field to any of the locally
       configured interfaces or loopback addresses.

   2a.

       a.  If the Egress TLV address lookup succeeds, set Best-return-code Best-return-
           code to 36 ("Replying router is an egress for the address in
           the Egress TLV for the FEC at stack depth RSC") <RSC>")
           (Section 6.2) in the MPLS Echo Reply echo reply message.

   2b.

       b.  If the Egress TLV address lookup fails, set the Best-return-code Best-return-
           code to 10, "Mapping 10 ("Mapping for this FEC is not the given label at
           stack-depth
   RSC" <RSC>").

   3.  In cases where multiple Nil FECs are sent from the SR Policy
       headend, one each corresponding to the labels in the label stack
       along with the Egress TLV, when the packet reaches the egress,
       the number of labels in the received packet (Size of stack-R)
       becomes zero or a label with the Bottom-of-Stack bit set to 1 is
       processed, all Nil FEC sub-TLVs MUST be removed and the Egress
       TLV MUST be validated.

5.  Backward Compatibility

   The extensions defined in this document is are backward compatible with
   the procedures described in [RFC8029].  A Router router that does not
   support the Egress TLV, TLV will ignore it and use current the Nil-FEC Nil FEC procedures
   described in [RFC8029].

   When the egress node in the path does not support the extensions
   defined in this document document, egress validation will not be done done, and Best-
   return-code as
   Best-return-code will be set to 3 ("Replying router is an egress for
   the FEC at stack-
   depth") stack-depth <RSC>") and Best-return- subcode set Best-rtn-subcode to stack-depth to will be set in
   the MPLS Echo Reply echo reply message.

   When the transit node in the path does not support the extensions
   defined in this document document, Best-return-code as will be set to 8 ("Label
   switched at
   stack-depth") stack-depth <RSC>") and Best-return-subcode as Label-stack-depth Best-rtn-subcode to Label-stack-
   depth to report transit switching will be set in the MPLS Echo Reply echo reply message.

6.  IANA Considerations

   The code points in section Section 6.1 and Section 6.2 have been
   assigned by [IANA] by early allocation on 2023-10-05 and 2021-11-08
   respectively.

6.1.  New TLV

   [IANA] is requested

   IANA has added the following entry to update the early allocation for Egress TLV in "TLVs" registry within the "Multi-Protocol
   "Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs)
   Ping Parameters" in the "TLVs" sub-registry to reference this
   document when published as an RFC.

           +=======+=============+============================+ registry group [IANA-MPLS-LSP]:

                    +=======+============+===========+
                    | Value Type  | Description TLV Name   | Reference |
           +=======+=============+============================+
                    +=======+============+===========+
                    | 32771 | Egress TLV | Section 3 of this document RFC 9655  |
           +-------+-------------+----------------------------+
                    +-------+------------+-----------+

                          Table 1: TLVs Sub-Registry Registry

6.2.  New Return code

   [IANA] is requested to update the early allocation of the Return Code
   for "Replying router is an egress for

   IANA has added the address in Egress TLV" in following entry to the "Multi-Protocol "Return Codes" registry
   within the "Multiprotocol Label Switching (MPLS) Label Switched Paths
   (LSPs) Ping Parameters" in the "Return Codes" sub-registry to
   reference this document when published as an RFC.

         +=======+================================+=============+ registry group [IANA-MPLS-LSP]:

         +=======+==================================+===========+
         | Value |          Description Meaning                          | Reference |
         +=======+================================+=============+
         +=======+==================================+===========+
         | 36    | Replying router is an egress for | Section 4.2 RFC 9655  |
         |       | for the address in the Egress TLV    | of this           |
         |       | for the FEC at stack depth RSC <RSC> | document           |
         +-------+--------------------------------+-------------+
         +-------+----------------------------------+-----------+

                      Table 2: Return code Sub-Registry Codes Registry

7.  Security Considerations

   This document defines an additional TLV for MPLS LSP ping TLVs and follows
   conforms to the mechanisms defined in [RFC8029].  All the security
   considerations defined in [RFC8287] will be applicable for apply to this document.  This
   document and, in
   addition, they do does not impose introduce any additional security challenges to be
   considered.

8.  Implementation Status

   This section is to be removed before publishing as an RFC.

   RFC-Editor: Please clean up the references cited by this section
   before publication.

   This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft, and is based on a proposal described in [RFC7942].
   The description of implementations in this section is intended to
   assist the IETF in its decision processes in progressing drafts to
   RFCs.  Please note that the listing of any individual implementation
   here does not imply endorsement by the IETF.  Furthermore, no effort
   has been spent to verify the information presented here that was
   supplied by IETF contributors.  This is not intended as, and must not
   be construed to be, a catalog of available implementations or their
   features.  Readers are advised to note that other implementations may
   exist.

8.1.  Juniper Networks

   Organization: Juniper Networks

   Implementation: JUNOS

   Description: Implementation for sending and validating Egress TLV

   Maturity Level: Released
   Coverage: Full

   Contact: shraddha@juniper.net

9.  Acknowledgements

   The authors would like to thank Stewart Bryant, Greg Mirsky,
   Alexander Vainshtein, Sanga Mitra Rajgopal, and Adrian Farrel for
   their careful review and comments.

10.  References

10.1.

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8029]  Kompella, K., Swallow, G., Pignataro, C., Ed., Kumar, N.,
              Aldrin, S., and M. Chen, "Detecting Multiprotocol Label
              Switched (MPLS) Data-Plane Failures", RFC 8029,
              DOI 10.17487/RFC8029, March 2017,
              <https://www.rfc-editor.org/info/rfc8029>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8287]  Kumar, N., Ed., Pignataro, C., Ed., Swallow, G., Akiya,
              N., Kini, S., and M. Chen, "Label Switched Path (LSP)
              Ping/Traceroute for Segment Routing (SR) IGP-Prefix and
              IGP-Adjacency Segment Identifiers (SIDs) with MPLS Data
              Planes", RFC 8287, DOI 10.17487/RFC8287, December 2017,
              <https://www.rfc-editor.org/info/rfc8287>.

   [RFC8402]  Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
              Decraene, B., Litkowski, S., and R. Shakir, "Segment
              Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
              July 2018, <https://www.rfc-editor.org/info/rfc8402>.

   [RFC9041]  Andersson, L., Chen, M., Pignataro, C., and T. Saad,
              "Updating the MPLS Label Switched Paths (LSPs) Ping
              Parameters IANA Registry", RFC 9041, DOI 10.17487/RFC9041,
              July 2021, <https://www.rfc-editor.org/info/rfc9041>.

   [RFC9256]  Filsfils, C., Talaulikar, K., Ed., Voyer, D., Bogdanov,
              A., Mattes,
              P., and D. Voyer, P. Mattes, "Segment Routing Policy Architecture",
              RFC 9256, DOI 10.17487/RFC9256, July 2020, 2022,
              <https://www.rfc-editor.org/info/rfc9256>.

10.2.

8.2.  Informative References

   [I.D-ietf-idr-sr-policy-safi]
              Filsfils, C., Ed.,

   [IANA-MPLS-LSP]
              IANA, "Multiprotocol Label Switching (MPLS) Label Switched
              Paths (LSPs) Ping Parameters",
              <http://www.iana.org/assignments/mpls-lsp-ping-
              parameters>.

   [SR-POLICY-BGP]
              Previdi, S., Ed., Filsfils, C., Talaulikar, K., Ed., Mattes,
              P., Rosen, E., Jain, D., and S. Lin, D. Jain, "Advertising Segment Routing Policies in
              BGP",  draft-ietf-idr-sr-
              policy-safi-04,  work Work in progress, April Progress, Internet-Draft, draft-ietf-idr-sr-
              policy-safi-10, 7 November 2024,
              <https://datatracker.ietf.org/doc/html/draft-ietf-idr-sr-
              policy-safi-04>.

   [IANA]     IANA, "Multiprotocol Label Switching (MPLS) Label Switched
              Paths (LSPs) Ping Parameters",
              <http://www.iana.org/assignments/mpls-lsp-ping-
              parameters>.

   [RFC7942]  Sheffer, Y. and A. Farrel, "Improving Awareness of Running
              Code:
              policy-safi-10>.

Acknowledgements

   The Implementation Status Section", BCP 205,
              RFC 7942, DOI 10.17487/RFC7942, July 2016,
              <https://www.rfc-editor.org/info/rfc7942>. authors would like to thank Stewart Bryant, Greg Mirsky,
   Alexander Vainshtein, Sanga Mitra Rajgopal, and Adrian Farrel for
   their careful review and comments.

Authors' Addresses

   Deepti N. Rathi (editor)
   Nokia
   Manyata Embassy Business Park
   Bangalore 560045
   Karnataka
   India
   Email: deepti.nirmalkumarji_rathi@nokia.com

   Shraddha Hegde (editor)
   Juniper Networks Inc.
   Exora Business Park
   Bangalore 560103
   KA
   Karnataka
   India
   Email: shraddha@juniper.net

   Kapil Arora
   Individual Contributor
   Email: kapil.it@gmail.com

   Zafar Ali
   Cisco Systems, Inc.
   Email: zali@cisco.com

   Nagendra Kumar Nainar
   Cisco Systems, Inc.
   Email: naikumar@cisco.com