Current Internet-Drafts
This summary sheet provides a short synopsis of each Internet-Draft
available within the "internet-drafts" directory at the shadow
sites directory. These Internet-Drafts are listed alphabetically by working
group acronym and start date. Generated 2024-11-29 14:05:44 UTC.
IPv6 over Networks of Resource-constrained Nodes (6lo)
------------------------------------------------------
"Transmission of SCHC-compressed packets over IEEE 802.15.4 networks",
Carles Gomez, Ana Minaburo, 2024-10-02,
A framework called Static Context Header Compression and
fragmentation (SCHC) has been designed with the primary goal of
supporting IPv6 over Low Power Wide Area Network (LPWAN) technologies
[RFC8724]. One of the SCHC components is a header compression
mechanism. If used properly, SCHC header compression allows a
greater compression ratio than that achievable with traditional
6LoWPAN header compression [RFC6282]. For this reason, it may make
sense to use SCHC header compression in some 6LoWPAN environments,
including IEEE 802.15.4 networks. This document specifies how a
SCHC-compressed packet can be carried over IEEE 802.15.4 networks.
The document also enables the transmission of SCHC-compressed UDP/
CoAP headers over 6LoWPAN-compressed IPv6 packets.
"Path-Aware Semantic Addressing (PASA) for Low power and Lossy Networks",
Luigi Iannone, Guangpeng Li, Zhe Lou, Peng Liu, Rong Long, Kiran Makhijani,
Pascal Thubert, 2024-11-25,
This document specifies a topological addressing scheme, Path-Aware
Semantic Addressing (PASA), that enables IP packet stateless
forwarding. The forwarding decision is based solely on the
destination address structure. This document focuses on carrying IP
packets across an LLN (Low power and Lossy Network), in which the
topology is static, the location of the nodes is fixed, and the
connection between the nodes is also rather stable. This
specifications describes the PASA architecture, along with PASA
address allocation, forwarding mechanism, header format design, and
IPv6 interconnection support.
"IPv6 Neighbor Discovery Prefix Registration", Pascal Thubert, 2024-11-09,
This document updates IPv6 Neighbor Discovery RFC4861 and the 6LoWPAN
extensions (RFC8505, RFC8928, RFC7400) to enable a node that owns or
is directly connected to a prefix to register that prefix to neighbor
routers. The registration indicates that the registered prefix can
be reached via the advertising node without a loop. The unicast
prefix registration also provides a protocol-independent interface
for the node to request neighbor router(s) to redistribute the prefix
to the larger routing domain using their specific routing protocols.
This document extends RPL (RFC6550, RFC6553, RFC9010) to enable the
6LR to inject the registered prefix in RPL.
"Transmission of IPv6 Packets over Short-Range Optical Wireless
Communications", Younghwan Choi, Cheol-min Kim, Carles Gomez, 2024-10-20,
IEEE 802.15.7, "Short-Range Optical Wireless Communications" defines
wireless communication using visible light. It defines how data is
transmitted, modulated, and organized in order to enable reliable and
efficient communication in various environments. The standard is
designed to work alongside other wireless communication systems and
supports both line-of-sight (LOS) and non-line-of-sight (NLOS)
communications. This document describes how IPv6 is transmitted over
short-range optical wireless communications (OWC) using IPv6 over
Low-Power Wireless Personal Area Network (6LoWPAN) techniques.
"Generic Address Assignment Option for 6LowPAN Neighbor Discovery", Luigi
Iannone, Zhe Lou, Adnan Rashid, 2024-11-25,
This document specifies a new extension to the IPv6 Neighbor
Discovery in Low Power and Lossy Networks, enabling a node to request
to be assigned an address or a prefix from neighbor routers. Such
mechanism allows to algorithmically assign addresses and prefixes to
nodes in a 6LowPAN deployment.
IPv6 Maintenance (6man)
-----------------------
"Improving the Robustness of Stateless Address Autoconfiguration (SLAAC) to
Flash Renumbering Events", Fernando Gont, Jan Zorz, Richard Patterson, Jen
Linkova, 2024-10-21,
In scenarios where network configuration information becomes invalid
without explicit notification to the local network, local hosts may
end up employing stale information for an unacceptably long period of
time, thus resulting in interoperability problems. This document
improves the reaction of IPv6 Stateless Address Autoconfiguration to
such configuration changes. It formally updates RFC 4191, RFC 4861,
RFC 4862, and RFC 8106.
"Limits on Sending and Processing IPv6 Extension Headers", Tom Herbert,
2024-11-08,
This specification defines various limits that may be applied to
receiving, sending, and otherwise processing packets that contain
IPv6 extension headers. The need for such limits is pragmatic to
facilitate interoperability amongst hosts and routers in the presence
of extension headers, thereby increasing the feasibility of
deployment of extension headers. The limits described herein
establish the minimum baseline of support for use of extension
headers on the Internet. If it is known that all communicating
parties for a particular communication, including destination hosts
and any routers in the path, are capable of supporting more than the
baseline then these default limits may be freely exceeded.
"Carrying Network Resource (NR) related Information in IPv6 Extension
Header", Jie Dong, Zhenbin Li, Chongfeng Xie, Chenhao Ma, Gyan Mishra,
2024-11-03,
Virtual Private Networks (VPNs) provide different customers with
logically separated connectivity over a common network
infrastructure. With the introduction of 5G and also in some
existing network scenarios, some customers may require network
connectivity services with advanced features comparing to
conventional VPN services. Such kind of network service is called
enhanced VPNs. Enhanced VPNs can be used, for example, to deliver
network slice services.
A Network Resource Partition (NRP) is a subset of the network
resources and associated policies on each of a connected set of links
in the underlay network. An NRP may be used as the underlay to
support one or a group of enhanced VPN services. For packet
forwarding within a specific NRP, some fields in the data packet are
used to identify the NRP to which the packet belongs. In doing so,
NRP-specific processing can be performed on each node along a path in
the NRP.
This document specifies a new IPv6 Hop-by-Hop option to carry network
resource related information (e.g., identifier) in data packets. The
NR Option can also be generalized for other network resource
semantics and functions.
"IPv6 Query for Enabled In-situ OAM Capabilities", Xiao Min, Greg Mirsky,
2024-06-20,
This document describes the application of the mechanism of
discovering In-situ OAM (IOAM) capabilities, described in RFC 9359
"Echo Request/Reply for Enabled In Situ OAM (IOAM) Capabilities", in
IPv6 networks. IPv6 Node IOAM Request uses the IPv6 Node Information
messages, allowing the IOAM encapsulating node to discover the
enabled IOAM capabilities of each IOAM transit and IOAM decapsulating
node.
This document updates RFCs 4620 and 4884.
"Architecture and Framework for IPv6 over Non-Broadcast Access", Pascal
Thubert, Michael Richardson, 2024-11-23,
This document presents an architecture and framework for IPv6 access
networks that decouples the network-layer concepts of Links,
Interface, and Subnets from the link-layer concepts of links, ports,
and broadcast domains, and limits the reliance on link-layer
broadcasts. This architecture is suitable for IPv6 over any network,
including non-broadcast networks, which is typically the case for
intangible media such as wireless and virtual networks such as
overlays. A study of the issues with IPv6 ND over intangible media
is presented, and a framework to solve those issues within the new
architecture is proposed.
"Prioritizing known-local IPv6 ULAs through address selection policy", Nick
Buraglio, Tim Chown, Jeremy Duncan, 2024-11-06,
This document draws on several years of operational experience to
update RFC 6724, defining the concept of "known-local" ULA prefixes
that enable ULA-to-ULA communications within fd00::/8 to become
preferred over both IPv4-IPv4 and GUA-to-GUA for local use. The
document defines the means by which nodes can both identify and
insert such prefixes into their address selection policy table. It
also clarifies the mandatory, unconditional requirement for support
for Rule 5.5 and demotes the preference for 6to4 addresses. These
changes to default behavior improve supportability of common use
cases, including automatic / unmanaged scenarios, and makes
preference for IPv6 over IPv4 consistent in local site networks for
both ULA and GUA prefixes. It is recognized that some less common
deployment scenarios may require explicit configuration or custom
changes to achieve desired operational parameters.
"Signaling DHCPv6 Prefix per Client Availability to Hosts", Lorenzo
Colitti, Jen Linkova, Xiao Ma, David Lamparter, 2024-10-08,
This document defines a "P" flag in the Prefix Information Option
(PIO) of IPv6 Router Advertisements (RAs). The flag is used to
indicate that the network prefers that clients use the RFC9663
deployment model instead of using individual adresses in the on-link
prefix assigned using Stateless Address Autoconfiguration (SLAAC) or
DHCPv6 address assignment.
This document updates RFC4862 to indicate that the Autonomous flag in
a PIO needs to be ignored if the PIO has the P flag set. It also
updates RFC4861 to specify that the P flag indicates DHCPv6 Prefix
Delegation support for clients.
"Entering IPv6 Zone Identifiers in User Interfaces", Brian Carpenter,
Robert Hinden, 2024-10-14,
This document describes how the zone identifier of an IPv6 scoped
address, defined in the IPv6 Scoped Address Architecture (RFC 4007),
should be entered into a user interface. It obsoletes RFC 6874 and
updates RFC 4007, RFC 7622 and RFC 8089.
Discussion Venue
This note is to be removed before publishing as an RFC.
Discussion of this document takes place on the 6MAN mailing list
([email protected]), which is archived at
https://mailarchive.ietf.org/arch/browse/ipv6/
(https://mailarchive.ietf.org/arch/browse/ipv6/).
"Deprecation Of The IPv6 Router Alert Option", Ron Bonica, 2024-11-08,
This document deprecates the IPv6 Router Alert Option. Protocols
that use the Router Alert Option may continue to do so, even in
future versions. However, protocols that are standardized in the
future must not use the Router Alert Option.
This document obsoletes RFC 2711.
"SNAC Router Flag in ICMPv6 Router Advertisement Messages", Jonathan Hui,
2024-10-08,
This document defines a new flag, the SNAC Router flag, in the Router
Advertisement message that can be used to distinguish configuration
information sent by SNAC routers from information sent by
infrastructure routers. This flag is used only by SNAC routers and
is ignored by all other devices.
"IPv6 Node Requirements", Tim Chown, John Loughney, Timothy Winters,
2024-10-21,
This document defines requirements for IPv6 nodes. It is expected
that IPv6 will be deployed in a wide range of devices and situations.
Specifying the requirements for IPv6 nodes allows IPv6 to function
well and interoperate in a large number of situations and
deployments.
This document obsoletes RFC 8504, and in turn RFC 6434 and its
predecessor, RFC 4294.
"Clarification of IPv6 Address Assignment Policy", Brian Carpenter, Suresh
Krishnan, David Farmer, 2024-08-26,
This document specifies the approval process for changes to the IPv6
Address Space registry. It also updates RFC 7249.
About This Document
This note is to be removed before publishing as an RFC.
Status information for this document may be found at
https://datatracker.ietf.org/doc/draft-ietf-6man-addr-assign/.
Discussion of this document takes place on the 6MAN Working Group
mailing list (mailto:[email protected]), which is archived at
https://mailarchive.ietf.org/arch/browse/ipv6/. Subscribe at
https://www.ietf.org/mailman/listinfo/ipv6/.
"The IPv6 VPN Service Destination Option", Ron Bonica, Xing Li, Adrian
Farrel, Yuji Kamite, Luay Jalil, 2024-11-08,
This document describes an experiment in which VPN service
information for both layer 2 and layer 3 VPNs is encoded in a new
IPv6 Destination Option. The new IPv6 Destination Option is called
the VPN Service Option.
One purpose of this experiment is to demonstrate that the VPN Service
Option can be implemented and deployed in a production network.
Another purpose is to demonstrate that the security considerations,
described in this document, have been sufficiently addressed.
Finally, this document encourages replication of the experiment.
Authentication and Authorization for Constrained Environments (ace)
-------------------------------------------------------------------
"Key Management for OSCORE Groups in ACE", Marco Tiloca, Jiye Park,
Francesca Palombini, 2023-03-06,
This document defines an application profile of the ACE framework for
Authentication and Authorization, to request and provision keying
material in group communication scenarios that are based on CoAP and
are secured with Group Object Security for Constrained RESTful
Environments (Group OSCORE). This application profile delegates the
authentication and authorization of Clients, that join an OSCORE
group through a Resource Server acting as Group Manager for that
group. This application profile leverages protocol-specific
transport profiles of ACE to achieve communication security, server
authentication and proof-of-possession for a key owned by the Client
and bound to an OAuth 2.0 Access Token.
"Publish-Subscribe Profile for Authentication and Authorization for
Constrained Environments (ACE)", Francesca Palombini, Cigdem Sengul, Marco
Tiloca, 2024-07-07,
This document defines an application profile of the Authentication
and Authorization for Constrained Environments (ACE) framework, to
enable secure group communication in the Publish-Subscribe (Pub-Sub)
architecture for the Constrained Application Protocol (CoAP) [draft-
ietf-core-coap-pubsub], where Publishers and Subscribers communicate
through a Broker. This profile relies on protocol-specific transport
profiles of ACE to achieve communication security, server
authentication, and proof-of-possession for a key owned by the Client
and bound to an OAuth 2.0 access token. This document specifies the
provisioning and enforcement of authorization information for Clients
to act as Publishers and/or Subscribers, as well as the provisioning
of keying material and security parameters that Clients use for
protecting their communications end-to-end through the Broker.
Note to RFC Editor: Please replace "[draft-ietf-core-coap-pubsub]"
with the RFC number of that document and delete this paragraph.
"Admin Interface for the OSCORE Group Manager", Marco Tiloca, Rikard
Hoeglund, Peter van der Stok, Francesca Palombini, 2024-07-08,
Group communication for CoAP can be secured using Group Object
Security for Constrained RESTful Environments (Group OSCORE). A
Group Manager is responsible for handling the joining of new group
members, as well as managing and distributing the group keying
material. This document defines a RESTful admin interface at the
Group Manager that allows an Administrator entity to create and
delete OSCORE groups, as well as to retrieve and update their
configuration. The ACE framework for Authentication and
Authorization is used to enforce authentication and authorization of
the Administrator at the Group Manager. Protocol-specific transport
profiles of ACE are used to achieve communication security, proof-of-
possession, and server authentication.
"EAP-based Authentication Service for CoAP", Rafael Marin-Lopez, Dan
Garcia-Carrillo, 2024-09-19,
This document specifies an authentication service that uses the
Extensible Authentication Protocol (EAP) transported employing
Constrained Application Protocol (CoAP) messages. As such, it
defines an EAP lower layer based on CoAP called CoAP-EAP. One of the
main goals is to authenticate a CoAP-enabled IoT device (EAP peer)
that intends to join a security domain managed by a Controller (EAP
authenticator). Secondly, it allows deriving key material to protect
CoAP messages exchanged between them based on Object Security for
Constrained RESTful Environments (OSCORE), enabling the establishment
of a security association between them.
"Notification of Revoked Access Tokens in the Authentication and
Authorization for Constrained Environments (ACE) Framework", Marco Tiloca,
Francesca Palombini, Sebastian Echeverria, Grace Lewis, 2024-09-22,
This document specifies a method of the Authentication and
Authorization for Constrained Environments (ACE) framework, which
allows an authorization server to notify clients and resource servers
(i.e., registered devices) about revoked access tokens. As specified
in this document, the method allows clients and resource servers to
access a Token Revocation List on the authorization server by using
the Constrained Application Protocol (CoAP), with the possible
additional use of resource observation. Resulting (unsolicited)
notifications of revoked access tokens complement alternative
approaches such as token introspection, while not requiring
additional endpoints on clients and resource servers.
"Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for
Constrained Environments (OSCORE) Profile for Authentication and
Authorization for Constrained Environments (ACE)", Goeran Selander, John
Mattsson, Marco Tiloca, Rikard Hoeglund, 2024-10-21,
This document specifies a profile for the Authentication and
Authorization for Constrained Environments (ACE) framework. It
utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
mutual authentication between an ACE-OAuth Client and Resource
Server, and it binds an authentication credential of the Client to an
ACE-OAuth access token. EDHOC also establishes an Object Security
for Constrained RESTful Environments (OSCORE) Security Context, which
is used to secure communications when accessing protected resources
according to the authorization information indicated in the access
token. This profile can be used to delegate management of
authorization information from a resource-constrained server to a
trusted host with less severe limitations regarding processing power
and memory.
"Protecting EST Payloads with OSCORE", Goeran Selander, Shahid Raza, Martin
Furuhed, Malisa Vucinic, Timothy Claeys, 2024-10-21,
Enrollment over Secure Transport (EST) is a certificate provisioning
protocol over HTTPS [RFC7030] or CoAPs [RFC9148]. This document
specifies how to carry EST over the Constrained Application Protocol
(CoAP) protected with Object Security for Constrained RESTful
Environments (OSCORE). The specification builds on the EST-coaps
[RFC9148] specification, but uses OSCORE and Ephemeral Diffie-Hellman
over COSE (EDHOC) instead of DTLS. The specification also leverages
the certificate structures defined in
[I-D.ietf-cose-cbor-encoded-cert], which can be optionally used
alongside X.509 certificates.
"Using the Constrained RESTful Application Language (CoRAL) with the Admin
Interface for the OSCORE Group Manager", Marco Tiloca, Rikard Hoeglund,
2024-07-08,
Group communication for CoAP can be secured using Group Object
Security for Constrained RESTful Environments (Group OSCORE). A
Group Manager is responsible to handle the joining of new group
members, as well as to manage and distribute the group keying
material. The Group Manager can provide a RESTful admin interface
that allows an Administrator entity to create and delete OSCORE
groups, as well as to retrieve and update their configuration. This
document specifies how an Administrator interacts with the admin
interface at the Group Manager by using the Constrained RESTful
Application Language (CoRAL). The ACE framework for Authentication
and Authorization is used to enforce authentication and authorization
of the Administrator at the Group Manager. Protocol-specific
transport profiles of ACE are used to achieve communication security,
proof-of-possession, and server authentication.
"Alternative Workflow and OAuth Parameters for the Authentication and
Authorization for Constrained Environments (ACE) Framework", Marco Tiloca,
Goeran Selander, 2024-10-21,
This document updates the Authentication and Authorization for
Constrained Environments Framework (ACE, RFC 9200) as follows.
First, it defines a new, alternative workflow that the authorization
server can use for uploading an access token to a resource server on
behalf of the client. Second, it defines new parameters and
encodings for the OAuth 2.0 token endpoint at the authorization
server. Third, it defines a method for the ACE framework to enforce
bidirectional access control by means of a single access token.
Fourth, it amends two of the requirements on profiles of the
framework. Finally, it deprecates the original payload format of
error responses that convey an error code, when CBOR is used to
encode message payloads. For such error responses, it defines a new
payload format aligned with RFC 9290, thus updating in this respect
also the profiles of ACE defined in RFC 9202, RFC 9203, and RFC 9431.
"The Group Object Security for Constrained RESTful Environments (Group
OSCORE) Profile of the Authentication and Authorization for Constrained
Environments (ACE) Framework", Marco Tiloca, Rikard Hoeglund, Francesca
Palombini, 2024-10-21,
This document specifies a profile for the Authentication and
Authorization for Constrained Environments (ACE) framework. The
profile uses Group Object Security for Constrained RESTful
Environments (Group OSCORE) to provide communication security between
a client and one or multiple resource servers that are members of an
OSCORE group. The profile securely binds an OAuth 2.0 access token
to the public key of the client associated with the private key used
by that client in the OSCORE group. The profile uses Group OSCORE to
achieve server authentication, as well as proof-of-possession for the
client's public key. Also, it provides proof of the client's
membership to the OSCORE group by binding the access token to
information from the Group OSCORE Security Context, thus allowing the
resource server(s) to verify the client's membership upon receiving a
message protected with Group OSCORE from the client. Effectively,
the profile enables fine-grained access control paired with secure
group communication, in accordance with the Zero Trust principles.
Automated Certificate Management Environment (acme)
---------------------------------------------------
"ACME End User Client and Code Signing Certificates", Kathleen Moriarty,
2024-11-26,
Automated Certificate Management Environment (ACME) core protocol
addresses the use case of web server certificates for TLS. This
document extends the ACME protocol to support end user client, device
client, and code signing certificates.
"ACME Integrations for Device Certificate Enrollment", Owen Friel, Richard
Barnes, Rifaat Shekh-Yusef, Michael Richardson, 2023-07-13,
This document outlines multiple advanced use cases and integrations
that ACME facilitates without any modifications or enhancements
required to the base ACME specification. The use cases include ACME
integration with EST, BRSKI and TEAP.
"Automated Certificate Management Environment (ACME) Delay-Tolerant
Networking (DTN) Node ID Validation Extension", Brian Sipos, 2024-11-07,
This document specifies an extension to the Automated Certificate
Management Environment (ACME) protocol which allows an ACME server to
validate the Delay-Tolerant Networking (DTN) Node ID for an ACME
client. A DTN Node ID is an identifier used in the Bundle Protocol
(BP) to name a "singleton endpoint", one which is registered on a
single BP node. The DTN Node ID is encoded as a certificate Subject
Alternative Name (SAN) of type otherName with a name form of
BundleEID and as an ACME Identifier type "bundleEID".
"Automated Certificate Management Environment (ACME) Renewal Information
(ARI) Extension", Aaron Gable, 2024-10-17,
This document specifies how an ACME server may provide suggestions to
ACME clients as to when they should attempt to renew their
certificates. This allows servers to mitigate load spikes, and
ensures clients do not make false assumptions about appropriate
certificate renewal periods.
"Automated Certificate Management Environment (ACME) Device Attestation
Extension", Brandon Weeks, 2024-08-25,
This document specifies new identifiers and a challenge for the
Automated Certificate Management Environment (ACME) protocol which
allows validating the identity of a device using attestation.
"Automated Certificate Management Environment (ACME) Extensions for
".onion" Special-Use Domain Names", Q Misell, 2024-11-07,
The document defines extensions to the Automated Certificate
Management Environment (ACME) to allow for the automatic issuance of
certificates to Tor hidden services (".onion" Special-Use Domain
Names).
Discussion
This note is to be removed before publishing as an RFC.
Source for this draft and an issue tracker can be found at
https://github.com/AS207960/acme-onion.
The project website and a reference implementation can be found at
https://acmeforonions.org.
"Automated Certificate Management Environment (ACME) DNS Labeled With ACME
Account ID Challenge", Antonios Chariton, Amir Omidi, James Kasten, Fotis
Loukos, Stanislaw Janikowski, 2024-11-13,
This document outlines a new DNS-based challenge type for the ACME
protocol that enables multiple independent systems to authorize a
single domain name concurrently. By adding a unique label to the DNS
validation record name, the dns-account-01 challenge avoids CNAME
delegation conflicts inherent to the dns-01 challenge type. This is
particularly valuable for multi-region or multi-cloud deployments
that wish to rely upon DNS-based domain control validation and need
to independently obtain certificates for the same domain.
Adaptive DNS Discovery (add)
----------------------------
"Establishing Local DNS Authority in Validated Split-Horizon Environments",
Tirumaleswar Reddy.K, Dan Wing, Kevin Smith, Benjamin Schwartz, 2024-06-20,
When split-horizon DNS is deployed by a network, certain domain names
can be resolved authoritatively by a network-provided DNS resolver.
DNS clients that are not configured to use this resolver by default
can use it for these specific domains only. This specification
defines a mechanism for domain owners to inform DNS clients about
local resolvers that are authorized to answer authoritatively for
certain subdomains.
"Encrypted DNS Server Redirection", John Todd, Tommy Jensen, Corey Mosher,
2024-10-21,
This document defines Encrypted DNS Server Redirection (EDSR), a
mechanism for encrypted DNS servers to redirect clients to other
encrypted DNS servers. This enables dynamic routing to geo-located
or otherwise more desirable encrypted DNS servers without modifying
DNS client endpoint configurations or the use of anycast by the DNS
server.
Application-Layer Traffic Optimization (alto)
---------------------------------------------
"YANG Data Models for the Application-Layer Traffic Optimization (ALTO)
Protocol", Jingxuan Zhang, Dhruv Dhody, Kai Gao, Roland Schott, Qiufang Ma,
2024-01-19,
This document defines a YANG data model for Operations,
Administration, and Maintenance (OAM) & Management of the
Application-Layer Traffic Optimization (ALTO) Protocol. The operator
of an ALTO server can use this data model to (1) set up the ALTO
server, (2) configure server discovery, (3) create, update and remove
ALTO information resources, (4) manage the access control of each
ALTO information resource, and (5) collect statistical data from the
ALTO server. The application provider can also use this data model
to configure ALTO clients to communicate with known ALTO servers.
Autonomic Networking Integrated Model and Approach (anima)
----------------------------------------------------------
"Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)",
Michael Richardson, Peter van der Stok, Panos Kampanakis, Esko Dijk,
2024-07-08,
This document defines the Constrained Bootstrapping Remote Secure Key
Infrastructure (cBRSKI) protocol, which provides a solution for
secure zero-touch onboarding of resource-constrained (IoT) devices
into the network of a domain owner. This protocol is designed for
constrained networks, which may have limited data throughput or may
experience frequent packet loss. cBRSKI is a variant of the BRSKI
protocol, which uses an artifact signed by the device manufacturer
called the "voucher" which enables a new device and the owner's
network to mutually authenticate. While the BRSKI voucher data is
encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher. The
BRSKI voucher data definition is extended with new data types that
allow for smaller voucher sizes. The Enrollment over Secure
Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
(CoAPS). This document Updates RFC 8995 and RFC 9148.
"BRSKI Cloud Registrar", Owen Friel, Rifaat Shekh-Yusef, Michael
Richardson, 2024-10-15,
Bootstrapping Remote Secure Key Infrastructures defines how to
onboard a device securely into an operator maintained infrastructure.
It assumes that there is local network infrastructure for the device
to discover and help the device. This document extends the new
device behavior so that if no local infrastructure is available, such
as in a home or remote office, that the device can use a well-defined
"call-home" mechanism to find the operator maintained infrastructure.
This document defines how to contact a well-known Cloud Registrar,
and two ways in which the new device may be redirected towards the
operator maintained infrastructure. The Cloud Registrar enables
discovery of the operator maintained infrastructure, and may enable
establishment of trust with operator maintained infrastructure that
does not support BRSKI mechanisms.
"JWS signed Voucher Artifacts for Bootstrapping Protocols", Thomas Werner,
Michael Richardson, 2024-11-05,
I-D.ietf-anima-rfc8366bis defines a digital artifact (known as a
voucher) as a YANG-defined JSON document that is signed using a
Cryptographic Message Syntax (CMS) structure. This document
introduces a variant of the voucher artifact in which CMS is replaced
by the JSON Object Signing and Encryption (JOSE) mechanism described
in RFC7515 to support deployments in which JOSE is preferred over
CMS. In addition to specifying the format, the "application/voucher-
jws+json" media type is registered and examples are provided.
"BRSKI with Pledge in Responder Mode (BRSKI-PRM)", Steffen Fries, Thomas
Werner, Eliot Lear, Michael Richardson, 2024-08-26,
This document defines enhancements to Bootstrapping a Remote Secure
Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
domains featuring no or only limited connectivity between a pledge
and the domain registrar. It specifically changes the interaction
model from a pledge-initiated mode, as used in BRSKI, to a pledge-
responding mode, where the pledge is in server role. For this, BRSKI
with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
for the Domain Registrar and pledge, and a new component, the
Registrar-Agent, which facilitates the communication between pledge
and registrar during the bootstrapping phase. To establish the trust
relation between pledge and registrar, BRSKI-PRM relies on object
security rather than transport security. The approach defined here
is agnostic to the enrollment protocol that connects the domain
registrar to the Key Infrastructure (e.g., domain CA).
"A Voucher Artifact for Bootstrapping Protocols", Kent Watsen, Michael
Richardson, Max Pritikin, Toerless Eckert, Qiufang Ma, 2024-07-08,
This document defines a strategy to securely assign a pledge to an
owner using an artifact signed, directly or indirectly, by the
pledge's manufacturer. This artifact is known as a "voucher".
This document defines an artifact format as a YANG-defined JSON or
CBOR document that has been signed using a variety of cryptographic
systems.
The voucher artifact is normally generated by the pledge's
manufacturer (i.e., the Manufacturer Authorized Signing Authority
(MASA)).
This document updates RFC8366, merging a number of extensions into
the YANG. The RFC8995 voucher request is also merged into this
document.
"BRSKI-AE: Alternative Enrollment Protocols in BRSKI", David von Oheimb,
Steffen Fries, Hendrik Brockhaus, 2024-09-17,
This document defines enhancements to the Bootstrapping Remote Secure
Key Infrastructure (BRSKI) protocol, known as BRSKI-AE (Alternative
Enrollment).
BRSKI-AE extends BRSKI to support certificate enrollment mechanisms
instead of the originally specified use of EST. It supports
certificate enrollment protocols, such as CMP, that use authenticated
self-contained signed objects for certification messages, allowing
for flexibility in network device onboarding scenarios.
The enhancements address use cases where the existing enrollment
mechanism may not be feasible or optimal, providing a framework for
integrating suitable alternative enrollment protocols.
This document also updates the BRSKI reference architecture to
accommodate these alternative methods, ensuring secure and scalable
deployment across a range of network environments.
"BRSKI discovery and variations", Toerless Eckert, Esko Dijk, 2024-10-21,
This document specifies how BRSKI entities, such as registrars,
proxies, pledges or others that are acting as responders, can be
discovered and selected by BRSKI entities acting as initiators,
especially in the face of variations in the protocols that can
introduce non-interoperability when not equally supported by both
responder and initiator.
Applications and Real-Time Area (art)
-------------------------------------
"Internationalized Domain Names in Applications (IDNA): Registry
Restrictions and Recommendations", John Klensin, Asmus Freytag, 2024-10-03,
The IDNA specifications for internationalized domain names combine
rules that determine the labels that are allowed in the DNS without
violating the protocol itself and an assignment of responsibility,
consistent with earlier specifications, for determining the labels
that are allowed in particular zones. Conformance to IDNA by
registries and other implementations requires both parts. Experience
strongly suggests that the language describing those responsibilities
was insufficiently clear to promote safe and interoperable use of the
specifications and that more details and discussion of circumstances
would have been helpful. Without making any substantive changes to
IDNA, this specification updates two of the core IDNA documents (RFCs
5890 and 5891) and the IDNA explanatory document (RFC 5894) to
provide that guidance and to correct some technical errors in the
descriptions.
"Simple Public Key Infrastructure (SPKI) S-Expressions", Ronald Rivest,
Donald Eastlake, 2024-11-04,
This memo specifies the data structure representation that was
devised to support Simple Public Key Infrastructure (SPKI, RFC 2692)
certificates with the intent that it be more widely applicable. It
has been and is being used elsewhere. There are multiple
implementations in a variety of programming languages. Uses of this
representation are referred to in this document as "S-expressions".
This memo makes precise the encodings of these SPKI S-expressions: it
gives a "canonical form" for them, describes two "transport"
representations, and also describe an "advanced" format for display
to people.
"Unicode Character Repertoire Subsets", Tim Bray, Paul Hoffman, 2024-06-07,
This document discusses specifying subsets of the Unicode character
repertoire for use in protocols and data formats. It also specifies
those subsets as PRECIS profiles.
"Internationalized Domain Names for Applications 2008 (IDNA2008) and
Unicode 15.0.0", Patrik Faltstrom, 2024-06-09,
This document describes the changes between Unicode 12.0.0 and
Unicode 15.0.0 in the context of IDNA2008. Some additions and
changes have been made in the Unicode Standard that affect the values
produced by the algorithm IDNA2008 specifies. The review assigns the
temporary status "under review" to certain code points. This is
added as exceptions to the algorithm for IDNA2008 that allows adding
exceptions to the algorithm for backward compatibility exceptions.
This document provides the necessary tables to IANA to make its
database consistent with Unicode 15.0.0.
Automatic SIP trunking And Peering (asap)
-----------------------------------------
"Automatic Peering for SIP Trunks", Kaustubh Inamdar, Sreekanth Narayanan,
Cullen Jennings, 2024-06-18,
This document specifies a framework that enables enterprise telephony
Session Initiation Protocol (SIP) networks to solicit and obtain a
capability set document from a SIP service provider. The capability
set document encodes a set of characteristics that enable easy
peering between enterprise and service provider SIP networks.
A Semantic Definition Format for Data and Interactions of Things (asdf)
-----------------------------------------------------------------------
"Semantic Definition Format (SDF) for Data and Interactions of Things",
Michael Koster, Carsten Bormann, Ari Keranen, 2024-02-28,
The Semantic Definition Format (SDF) is a format for domain experts
to use in the creation and maintenance of data and interaction models
that describe Things, i.e., physical objects that are available for
interaction over a network. An SDF specification describes
definitions of SDF Objects/SDF Things and their associated
interactions (Events, Actions, Properties), as well as the Data types
for the information exchanged in those interactions. Tools convert
this format to database formats and other serializations as needed.
// The present revision (-18) adds security considerations, a few
// editorial cleanups, discusses JSON pointer encodings, and adds
// sockets to the CDDL for easier future extension.
"An Application Layer Interface for Non-IP device control (NIPC)", Bart
Brinckman, Rohit Mohan, Braeden Sanford, 2024-10-21,
This memo specifies RESTful application layer interface for gateways
providing operations against non-IP devices. The described interface
is extensible. This memo initially describes Bluetooth Low Energy
and Zigbee as they are the most commonly deployed.
Audio/Video Transport Core Maintenance (avtcore)
------------------------------------------------
"RTP Payload Format for VP9 Video", Justin Uberti, Stefan Holmer, Magnus
Flodman, Danny Hong, Jonathan Lennox, 2021-06-10,
This specification describes an RTP payload format for the VP9 video
codec. The payload format has wide applicability, as it supports
applications from low bit-rate peer-to-peer usage, to high bit-rate
video conferences. It includes provisions for temporal and spatial
scalability.
"Video Frame Marking RTP Header Extension", Mo Zanaty, Espen Berger, Suhas
Nandakumar, 2024-03-04,
This document describes a Video Frame Marking RTP header extension
used to convey information about video frames that is critical for
error recovery and packet forwarding in RTP middleboxes or network
nodes. It is most useful when media is encrypted, and essential when
the middlebox or node has no access to the media decryption keys. It
is also useful for codec-agnostic processing of encrypted or
unencrypted media, while it also supports extensions for codec-
specific information.
"RTP over QUIC (RoQ)", Mathis Engelbart, Joerg Ott, Spencer Dawkins,
2024-10-21,
This document specifies a minimal mapping for encapsulating Real-time
Transport Protocol (RTP) and RTP Control Protocol (RTCP) packets
within the QUIC protocol. This mapping is called RTP over QUIC
(RoQ).
This document also discusses how to leverage state that is already
available from the QUIC implementation in the endpoints, in order to
reduce the need to exchange RTCP packets, and describes different
options for implementing congestion control and rate adaptation for
RTP without relying on RTCP feedback.
"RTP Payload Format for Visual Volumetric Video-based Coding (V3C)", Lauri
Ilola, Lukasz Kondrad, 2024-09-19,
A visual volumetric video-based coding (V3C) [ISO.IEC.23090-5]
bitstream is composed of V3C units that contain V3C atlas sub-
bitstreams, V3C video sub-bitstreams, and a V3C parameter set. This
memo describes an RTP payload format for V3C atlas sub-bitstreams.
The RTP payload format for V3C video sub-bitstreams is defined by
relevant Internet Standards for the applicable video codec. The V3C
RTP payload format allows for packetization of one or more V3C atlas
Network Abstraction Layer (NAL) units in an RTP packet payload as
well as fragmentation of a V3C atlas NAL unit into multiple RTP
packets. The memo also describes the mechanisms for grouping RTP
streams of V3C component sub-bitstreams, providing a complete
solution for streaming V3C encoded content.
"RTP Control Protocol (RTCP) Messages for Temporal-Spatial Resolution",
Yong He, Christian Herglotz, Edouard Francois, 2024-10-07,
This specification describes an RTCP feedback message format for the
ISO/IEC International Standard 23001-11, known as Energy Efficient
Media Consumption (Green metadata), developed by the ISO/IEC JTC 1/SC
29/ WG 3 MPEG System. The RTCP payload format specified in this
specification enables receivers to provide feedback to the senders
and thus allows for short-term adaptation and feedback-based energy
efficient mechanisms to be implemented. The payload format has broad
applicability in real-time video communication services.
"H.265 Profile for WebRTC", Bernard Aboba, Philipp Hancke, 2024-11-15,
RFC 7742 defines WebRTC video processing and codec requirements,
including guidance for endpoints supporting the VP8 and H.264 codecs,
which are mandatory to implement. With support for H.265 under
development in WebRTC browsers, similar guidance is needed for
browsers considering support for the H.265 codec, whose RTP payload
format is defined in RFC 7798.
"RTP Payload Format for sub-codestream latency JPEG 2000 streaming",
Pierre-Anthony Lemieux, David Taubman, 2024-10-08,
This RTP payload format defines the streaming of a video signal
encoded as a sequence of JPEG 2000 codestreams. The format allows
sub-codestream latency, such that the first RTP packet for a given
codestream can be emitted before the entire codestream is available.
"RTP Payload for Haptics", Hyunsik Yang, Xavier de Foy, 2024-07-05,
This memo describes an RTP payload format for the MPEG-I haptic data.
A haptic media stream is composed of MIHS units including a
MIHS(MPEG-I Haptic Stream) unit header and zero or more MIHS packets.
The RTP payload header format allows for packetization of a MIHS unit
in an RTP packet payload as well as fragmentation of a MIHS unit into
multiple RTP packets.
"Closing the RTP Payload Format Media Types IANA Registry", Magnus
Westerlund, 2024-10-18,
A number of authors of RTP Payload Formats and the WG process have
failed to ensure that the media types for RTP payload formats is
registred in the IANA registry "RTP Payload Formats Media Types" as
recommended by RFC 8088. To simplify the process and rely only on
the media types registry this document closes the RTP payload
specific registry. In addition it updates the instruction to payload
format authors in RFC 8088 to reflect this change.
Audio/Video Transport Extensions (avtext)
-----------------------------------------
"The Layer Refresh Request (LRR) RTCP Feedback Message", Jonathan Lennox,
Danny Hong, Justin Uberti, Stefan Holmer, Magnus Flodman, 2017-07-02,
This memo describes the RTCP Payload-Specific Feedback Message "Layer
Refresh Request" (LRR), which can be used to request a state refresh
of one or more substreams of a layered media stream. It also defines
its use with several RTP payloads for scalable media formats.
BGP Enabled ServiceS (bess)
---------------------------
"Preference-based EVPN DF Election", Jorge Rabadan, Senthil Sathappan, Wen
Lin, John Drake, Ali Sajassi, 2023-10-09,
The Designated Forwarder (DF) in Ethernet Virtual Private Networks
(EVPN) is defined as the Provider Edge (PE) router responsible for
sending Broadcast, Unknown unicast and Multicast traffic (BUM) to a
multi-homed device/network in the case of an all-active multi-homing
Ethernet Segment (ES), or BUM and unicast in the case of single-
active multi-homing. The Designated Forwarder is selected out of a
candidate list of PEs that advertise the same Ethernet Segment
Identifier (ESI) to the EVPN network, according to the Default
Designated Forwarder Election algorithm. While the Default Algorithm
provides an efficient and automated way of selecting the Designated
Forwarder across different Ethernet Tags in the Ethernet Segment,
there are some use cases where a more 'deterministic' and user-
controlled method is required. At the same time, Network Operators
require an easy way to force an on-demand Designated Forwarder
switchover in order to carry out some maintenance tasks on the
existing Designated Forwarder or control whether a new active PE can
preempt the existing Designated Forwarder PE.
This document proposes a Designated Forwarder Election algorithm that
meets the requirements of determinism and operation control. This
document updates RFC8584 by modifying the definition of the DF
Election Extended Community.
"EVPN VPWS Flexible Cross-Connect Service", Ali Sajassi, Patrice Brissette,
Jim Uttaro, John Drake, Sami Boutros, Jorge Rabadan, 2024-09-19,
This document describes a new EVPN VPWS service type specifically for
multiplexing multiple attachment circuits across different Ethernet
Segments and physical interfaces into a single EVPN VPWS service
tunnel and still providing Single-Active and All-Active multi-homing.
This new service is referred to as flexible cross-connect service.
After a description of the rationale for this new service type, the
solution to deliver such service is detailed.
"Fast Recovery for EVPN Designated Forwarder Election", Patrice Brissette,
Ali Sajassi, Luc Burdet, John Drake, Jorge Rabadan, 2024-11-20,
The Ethernet Virtual Private Network (EVPN) solution in RFC 7432
provides Designated Forwarder (DF) election procedures for multihomed
Ethernet Segments. These procedures have been enhanced further by
applying the Highest Random Weight (HRW) algorithm for Designated
Forwarder election to avoid unnecessary DF status changes upon a
failure. This document improves these procedures by providing a fast
Designated Forwarder election upon recovery of the failed link or
node associated with the multihomed Ethernet Segment. This document
updates RFC 8584 by optionally introducing delays between some of the
events therein.
The solution is independent of the number of EVPN Instances (EVIs)
associated with that Ethernet Segment and it is performed via a
simple signaling in BGP between the recovered node and each of the
other nodes in the multihoming group.
"EVPN Virtual Ethernet Segment", Ali Sajassi, Patrice Brissette, Rick
Schell, John Drake, Jorge Rabadan, 2024-11-03,
Ethernet VPN (EVPN) and Provider Backbone EVPN (PBB-EVPN) introduce a
comprehensive suite of solutions for delivering Ethernet services
over MPLS/IP networks. These solutions offer advanced features,
including multi-homing capabilities. Specifically, they support
Single-Active and All-Active redundancy modes for an Ethernet Segment
(ES), which is defined as a collection of physical links connecting a
multi-homed device or network to a set of Provider Edge (PE) devices.
This document extends the concept of an Ethernet Segment by allowing
an ES to be associated with a set of Ethernet Virtual Circuits (EVCs,
such as VLANs) or other entities, including MPLS Label Switched Paths
(LSPs) or Pseudowires (PWs). This extended concept is referred to as
Virtual Ethernet Segments (vES). This draft outlines the
requirements and necessary extensions to support vES in both EVPN and
PBB-EVPN.
"Weighted Multi-Path Procedures for EVPN Multi-Homing", Neeraj Malhotra,
Ali Sajassi, Jorge Rabadan, John Drake, Avinash Lingala, Samir Thoria,
2024-11-12,
EVPN enables all-active multi-homing for a CE (Customer Equipment)
device connected to two or more PE (Provider Equipment) devices via a
LAG (Link Aggregation), such that bridged and routed traffic from
remote PEs to hosts attached to the Ethernet Segment can be equally
load balanced (it uses Equal Cost Multi Path) across the multi-homing
PEs. EVPN also enables multi-homing for IP subnets advertised in IP
Prefix routes, so that routed traffic from remote PEs to those IP
subnets can be load balanced. This document defines extensions to
EVPN procedures to optimally handle unequal access bandwidth
distribution across a set of multi-homing PEs in order to:
* provide greater flexibility, with respect to adding or removing
individual multi-homed PE-CE links.
* handle multi-homed PE-CE link failures that can result in unequal
PE-CE access bandwidth across a set of multi-homing PEs.
In order to achieve the above, it specifies signaling extensions and
procedures to:
* Loadbalance bridged and routed traffic across egress PEs in
proportion to PE-CE link bandwidth or a generalized weight
distribution.
* Achieve BUM (Broadcast, UnknownUnicast, Multicast) DF (Designated
Forwarder) election distribution for a given ES (Ethernet Segment)
across the multi-homing PE set in proportion to PE-CE link
bandwidth. Section 6 of this document further updates RFC 8584,
draft-ietf-bess-evpn-per-mcast-flow-df-election and draft-ietf-
bess-evpn-pref-df in order for the DF election extension defined
in this document to work across different DF election algorithms.
"EVPN Interworking with IPVPN", Jorge Rabadan, Ali Sajassi, Eric Rosen,
John Drake, Wen Lin, Jim Uttaro, Adam Simpson, 2024-06-24,
Ethernet Virtual Private Network (EVPN) is used as a unified control
plane for tenant network intra and inter-subnet forwarding. When a
tenant network spans not only EVPN domains but also domains where BGP
VPN-IP or IP families provide inter-subnet forwarding, there is a
need to specify the interworking aspects between BGP domains of type
EVPN, VPN-IP and IP, so that the end to end tenant connectivity can
be accomplished. This document specifies how EVPN interworks with
VPN-IPv4/VPN-IPv6 and IPv4/IPv6 BGP families for inter-subnet
forwarding. The document also addresses the interconnect of EVPN
domains for Inter-Subnet Forwarding routes. In addition, this
specification defines a new BGP Path Attribute called D-PATH (Domain
PATH) that protects gateways against control plane loops. D-PATH
modifies the BGP best path selection for multiprotocol BGP routes of
SAFI 128 and EVPN IP Prefix routes, and therefore this document
updates the BGP best path selection specification, but only for IPVPN
and EVPN families.
"Extended Mobility Procedures for EVPN-IRB", Neeraj Malhotra, Ali Sajassi,
Aparna Pattekar, Jorge Rabadan, Avinash Lingala, John Drake, 2024-10-16,
This document specifies extensions to Ethernet VPN (EVPN) Integrated
Routing and Bridging (IRB) procedures specified in RFC7432 and
RFC9135 to enhance the mobility mechanisms for EVPN IRB-based
networks. The proposed extensions improve the handling of host
mobility and duplicate address detection in EVPN-IRB networks to
cover a broader set of scenarios where host IP to MAC bindings may
change across moves. These enhancements address limitations in the
existing EVPN IRB mobility procedures by providing more efficient and
scalable solutions. The extensions are backward compatible with
existing EVPN IRB implementations and aim to optimize network
performance in scenarios involving frequent IP address mobility.
NOTE TO IESG (TO BE DELETED BEFORE PUBLISHING): This draft lists six
authors which is above the required limit of five. Given significant
and active contributions to the draft from all six authors over the
course of six years, we would like to request IESG to allow
publication with six authors. Specifically, the three Cisco authors
are the original inventors of these procedures and contributed
heavily to rev 0 draft, most of which is still intact. AT&T is also
a key contributor towards defining the use cases that this document
addresses as well as the proposed solution. Authors from Nokia and
Juniper have further contributed to revisions and discussions
steadily over last six years to enable respective implementations and
a wider adoption.
"EVPN control plane for Geneve", Sami Boutros, Ali Sajassi, John Drake,
Jorge Rabadan, Sam Aldrin, 2024-07-05,
This document describes how Ethernet VPN (EVPN) control plane can be
used with Network Virtualization Overlay over Layer 3 (NVO3) Generic
Network Virtualization Encapsulation (Geneve) encapsulation for NVO3
solutions.
EVPN control plane can also be used by Network Virtualization Edges
(NVEs) to express Geneve tunnel option TLV(s) supported in the
transmission and/or reception of Geneve encapsulated data packets.
"Seamless Multicast Interoperability between EVPN and MVPN PEs", Ali
Sajassi, Kesavan Thiruvenkatasamy, Samir Thoria, Ashutosh Gupta, Luay
Jalil, 2024-06-24,
Ethernet Virtual Private Network (EVPN) solution is becoming
pervasive for Network Virtualization Overlay (NVO) services in data
center (DC), Enterprise networks as well as in service provider (SP)
networks.
As service providers transform their networks in their Central
Offices (COs) towards the next generation data center with Software
Defined Networking (SDN) based fabric and Network Function
Virtualization (NFV), they want to be able to maintain their offered
services including Multicast VPN (MVPN) service between their
existing network and their new Service Provider Data Center (SPDC)
network seamlessly without the use of gateway devices. They want to
have such seamless interoperability between their new SPDCs and their
existing networks for a) reducing cost, b) having optimum forwarding,
and c) reducing provisioning. This document describes a unified
solution based on RFCs 6513 & 6514 for seamless interoperability of
Multicast VPN between EVPN and MVPN PEs. Furthermore, it describes
how the proposed solution can be used as a routed multicast solution
in data centers with only EVPN PEs.
"Controller Based BGP Multicast Signaling", Zhaohui Zhang, Robert Raszuk,
Dante Pacella, Arkadiy Gulko, 2024-07-01,
This document specifies a way that one or more centralized
controllers can use BGP to set up multicast distribution trees
(identified by either IP source/destination address pair, or mLDP
FEC) in a network. Since the controllers calculate the trees, they
can use sophisticated algorithms and constraints to achieve traffic
engineering. The controllers directly signal dynamic replication
state to tree nodes, leading to very simple multicast control plane
on the tree nodes, as if they were using static routes. This can be
used for both underlay and overlay multicast trees, including
replacing BGP-MVPN signaling.
"BGP Based Multicast", Zhaohui Zhang, Lenny Giuliano, Keyur Patel, IJsbrand
Wijnands, Mankamana Mishra, Arkadiy Gulko, 2024-06-03,
This document specifies a BGP address family and related procedures
that allow BGP to be used for setting up multicast distribution
trees. This document also specifies procedures that enable BGP to be
used for multicast source discovery, and for showing interest in
receiving particular multicast flows. Taken together, these
procedures allow BGP to be used as a replacement for other multicast
routing protocols, such as PIM or mLDP. The BGP procedures specified
here are based on the BGP multicast procedures that were originally
designed for use by providers of Multicast Virtual Private Network
service.
This document also describes how various signaling mechanisms can be
used to set up end-to-end inter-region multicast trees.
"EVPN Port-Active Redundancy Mode", Patrice Brissette, Luc Burdet, Bin Wen,
Eddie Leyton, Jorge Rabadan, 2024-10-16,
The Multi-Chassis Link Aggregation Group (MC-LAG) technology enables
establishing a logical link-aggregation connection with a redundant
group of independent nodes. The objective of MC-LAG is to enhance
both network availability and bandwidth utilization through various
modes of traffic load-balancing. RFC7432 defines EVPN-based MC-LAG
with Single-active and All-active multi-homing redundancy modes.
This document builds on the existing redundancy mechanisms supported
by EVPN and introduces a new Port-Active redundancy mode.
"Extended Procedures for EVPN Optimized Ingress Replication", Wen Lin,
Selvakumar Sivaraj, Vishal Garg, Jorge Rabadan, 2024-10-21,
In the Virtualization Overlay (NVO) network with Ethernet VPN (EVPN),
optimized ingress replication uses Assisted-Replication (AR) to
achieve more efficient delivery of Broadcast and Multicast (BM)
traffic. An AR-LEAF, which is a Network Virtualization Edge (NVE)
device, forwards received BM traffic from its tenant system to an AR-
REPLICATOR. The AR-REPLICATOR then replicates it to the remaining
AR-LEAFs in the network. However, when replicating the packet on
behalf of its multihomed AR-LEAF, an AR-REPLICATOR may face
challenges in retaining the source IP address or including the
expected Ethernet Segment Identifier (ESI) label that is required for
EVPN split-horizon filtering. This document extends the optimized
ingress replication procedures to address such limitations. The
extended procedures specified in this document allow the support of
EVPN multihoming on the AR-LEAFs as well as optimized ingress
replication for the rest of the EVPN NVO network.
"EVPN Network Layer Fault Management", Vengada Govindan, Mallik Mudigonda,
Ali Sajassi, Greg Mirsky, Donald Eastlake, 2024-09-25,
This document specifies proactive, in-band network layer OAM (RFC
9062) mechanisms to detect loss of continuity faults that affect
unicast and multi-destination paths (used by Broadcast, Unknown
Unicast, and Multicast traffic) in an Ethernet VPN (EVPN, RFC
7432bis) network. The mechanisms specified in this document use the
widely adopted Bidirectional Forwarding Detection (RFC 5880)
protocol.
"BGP EVPN Multi-Homing Extensions for Split Horizon Filtering", Jorge
Rabadan, Kiran Nagaraj, Wen Lin, Ali Sajassi, 2024-08-17,
Ethernet Virtual Private Network (EVPN) is commonly used with Network
Virtualization Overlay (NVO) tunnels, as well as MPLS and Segment
Routing tunnels. The multi-homing procedures in EVPN may vary based
on the type of tunnel used within the EVPN Broadcast Domain.
Specifically, there are two multi-homing Split Horizon procedures
designed to prevent looped frames on multi-homed Customer Edge (CE)
devices: the ESI Label-based procedure and the Local Bias procedure.
The ESI Label-based Split Horizon is applied to MPLS-based tunnels,
such as MPLSoUDP, while the Local Bias procedure is used for other
tunnels, such as VXLAN.
Current specifications do not allow operators to choose which Split
Horizon procedure to use for tunnel encapsulations that support both
methods. Examples of tunnels that may support both procedures
include MPLSoGRE, MPLSoUDP, GENEVE, and SRv6. This document updates
the EVPN multi-homing procedures described in RFC 8365 and RFC 7432,
enabling operators to select the Split Horizon procedure that meets
their specific requirements.
"Multicast and Ethernet VPN with Segment Routing P2MP and Ingress
Replication", Rishabh Parekh, Clarence Filsfils, Mankamana Mishra, Hooman
Bidgoli, Dan Voyer, Zhaohui Zhang, 2024-11-06,
A Point-to-Multipoint (P2MP) Tree in a Segment Routing domain carries
traffic from a Root to a set of Leaves. This document describes
extensions to BGP encodings and procedures for P2MP trees and Ingress
Replication used in BGP/MPLS IP VPNs and Ethernet VPNs in a Segment
Routing domain.
"BGP MPLS-Based Ethernet VPN", Ali Sajassi, Luc Burdet, John Drake, Jorge
Rabadan, 2024-07-24,
This document describes procedures for Ethernet VPN (EVPN), a BGP
MPLS-based solution which addresses the requirements specified in the
corresponding RFC - "Requirements for Ethernet VPN (EVPN)". This
document obsoletes RFC7432 (BGP MPLS-Based Ethernet VPN) and updates
RFC8214 (Virtual Private Wire Service Support in Ethernet VPN).
"Multicast Source Redundancy in EVPN Networks", Jorge Rabadan, Jayant
Kotalwar, Senthil Sathappan, Zhaohui Zhang, Wen Lin, 2024-11-13,
Ethernet Virtual Private Network (EVPN) supports intra and inter-
subnet IP multicast forwarding. However, EVPN (or conventional IP
multicast techniques for that matter) do not have a solution for the
case where the following two statements are true at the same time: a)
a given multicast group carries more than one flow (i.e., more than
one source), and b) it is desired that each receiver gets only one of
the several flows. Existing multicast techniques assume there are no
redundant sources sending the same flow to the same IP multicast
group, and, in case there were redundant sources, the receiver's
application would deal with the received duplicated packets. This
document extends the existing EVPN specifications and assumes that IP
Multicast source redundancy may exist. It also assumes that, in case
two or more sources send the same IP Multicast flows into the tenant
domain, the EVPN PEs need to avoid that the receivers get packet
duplication by following the described procedures.
"Cumulative DMZ Link Bandwidth and load-balancing", MOHANTY Satya, Arie
Vayner, Akshay Gattani, Ajay Kini, Jeff Tantsura, Reshma Das, 2024-06-16,
The DMZ Link Bandwidth draft provides a way to load-balance traffic
to a destination which is reachable via more than one path according
to the weight attahced. Typically, the link bandwidth (either
configured on the link of the EBGP egress interface or set via a
policy) is encoded in an extended community and then sent to the IBGP
peer that employs multi-path. The link-bandwidth value is then
extracted from the extended community and is used as a weight in the
RIB/FIB, which does the load-balancing. This draft extends the usage
of the DMZ link bandwidth to another setting where the ingress BGP
speaker requires knowledge of the cumulative bandwidth while doing
the load-balancing. The draft also proposes neighbor-level knobs to
enable the link bandwidth extended community to be regenerated and
then advertised to EBGP peers to override the default behavior of not
advertising optional non-transitive attributes to EBGP peers.
"Weighted HRW and its applications", MOHANTY Satya, Mankamana Mishra, Acee
Lindem, Ali Sajassi, John Drake, 2024-10-21,
Rendezvous Hashing also known as Highest Random Weight (HRW) has been
used in many load balancing applications where the central problem is
how to map an object to as server such that the mapping is uniform
and also minimally affected by the change in the server set.
Recently, it has found use in DF election algorithms in the EVPN
context and load balancing using DMZ. This draft deals with the
problem of achieving load balancing with minimal disruption when the
servers have different weights. It provides an algorithm to do so
and also describes a few use-case scenarios where this algorithmic
technique can apply.
"EVPN-VPWS Seamless Integration with L2VPN VPWS", Patrice Brissette, Wen
Lin, Jorge Rabadan, Jim Uttaro, Bin Wen, 2024-10-18,
This document presents a solution for migrating L2VPN Virtual Private
Wire Service (VPWS) to Ethernet VPN Virtual Private Wire Service
(EVPN-VPWS) services. The solution allows the coexistence of EVPN
and L2VPN services under the same point-to-point VPN instance. By
using this seamless integration solution, a service provider can
introduce EVPN into their existing L2VPN network or migrate from an
existing L2VPN based network to EVPN. The migration may be done per
pseudowire or per flexible-crossconnect (FXC) service basis. This
document specifies control-plane and forwarding behaviors.
"Secure EVPN", Ali Sajassi, Ayan Banerjee, Samir Thoria, David Carrel,
Brian Weis, John Drake, 2024-11-07,
The applications of EVPN-based solutions (BGP MPLS-based Ethernet VPN
and Network Virtualization Overlay Solution using EVPN) have become
pervasive in Data Center, Service Provider, and Enterprise segments.
It is being used for fabric overlays and inter-site connectivity in
the Data Center market segment, for Layer-2, Layer-3, and IRB VPN
services in the Service Provider market segment, and for fabric
overlay and WAN connectivity in Enterprise networks. For Data Center
and Enterprise applications, there is a need to provide inter-site
and WAN connectivity over public Internet in a secured manner with
same level of privacy, integrity, and authentication for tenant's
traffic as IPsec tunneling using IKEv2. This document presents a
solution where BGP point-to-multipoint signaling is leveraged for key
and policy exchange among PE devices to create private pair-wise
IPsec Security Associations without IKEv2 point-to-point signaling or
any other direct peer-to-peer session establishment messages.
"SRv6 Argument Signaling for BGP Services", Ketan Talaulikar, Syed Raza,
Jorge Rabadan, Wen Lin, 2024-11-03,
RFC9252 defines procedures and messages for SRv6-based BGP services
including L3VPN, EVPN, and Internet services. This document updates
RFC9252 and provides more detailed specifications for the signaling
and processing of SRv6 SID advertisements for BGP Service routes
associated with SRv6 Endpoint Behaviors that support arguments.
"IPv4-Only and IPv6-Only PE Design DESIGN ALL SAFI", Gyan Mishra, Sudha
Madhavi, Adam Simpson, Mankamana Mishra, Jeff Tantsura, Shuanglong Chen,
2024-09-18,
As Enterprises and Service Providers upgrade their brown field or
green field MPLS/SR core to an IPv6 transport, Multiprotocol BGP (MP-
BGP)now plays an important role in the transition of their Provider
(P) core network as well as Provider Edge (PE) Inter-AS peering
network from IPv4 to IPv6. Operators must have flexiblity to
continue to support IPv4 customers when both the Core and Edge
networks migrate to IPv6. As well as must be able to support IPv6
networks in cases where operators decide to remain on an IPv4 network
or during transition.
This document details the External BGP (eBGP) PE-PE Inter-AS and PE-
CE Edge peering IPv4-Only PE design where both IPv4 and IPv6 all
supported SAFI NLRI can be advertised over a single IPv4 peer and
IPv6-Only PE Design where all supported SAFI NLRI can be advertised
over a single IPv6 peer.
This document also defines a new IPv4 BGP next hop encoding standard
that uses an IPv4 address as the next hop and not an IPv4 mapped IPv6
address.
This document also provides vendor specific test cases for the
IPv4-Only peering design and IPv6-Only PE design as well as test
results for the four major vendors stakeholders in the routing and
switching indusrty, Cisco, Juniper, Nokia and Huawei. With the test
results provided for the IPv6-Only Edge peering design, the goal is
that all other vendors around the world that have not been tested
will begin to adopt and implement the design.
"EVPN Support for L3 Fast Convergence and Aliasing/Backup Path", Ali
Sajassi, Jorge Rabadan, S. Pasupula, Lukas Krattiger, John Drake,
2024-11-04,
This document proposes an EVPN extension to allow several of its
multi-homing functions, fast convergence, and aliasing/backup path,
to be used in conjunction with inter-subnet forwarding. The
extension is limited to All-Active and Single-Active redundancy
modes.
"Domain Path (D-PATH) for Ethernet VPN (EVPN) Interconnect Networks", Jorge
Rabadan, Senthil Sathappan, Mallika Gautam, Patrice Brissette, Wen Lin,
2024-06-24,
The BGP Domain PATH (D-PATH) attribute is defined for Inter-Subnet
Forwarding (ISF) BGP Sub-Address Families that advertise IP prefixes.
When used along with EVPN IP Prefix routes or IP-VPN routes, it
identifies the domain(s) through which the routes have passed and
that information can be used by the receiver BGP speakers to detect
routing loops or influence the BGP best path selection. This
document extends the use of D-PATH so that it can also be used along
with other EVPN route types.
Bidirectional Forwarding Detection (bfd)
----------------------------------------
"Optimizing BFD Authentication", Mahesh Jethanandani, Ashesh Mishra, Ankur
Saxena, Manav Bhatia, Jeffrey Haas, 2024-10-21,
This document describes an optimization to BFD Authentication as
described in Section 6.7 of BFD RFC 5880.
"BFD Stability", Ashesh Mishra, Mahesh Jethanandani, Ankur Saxena, Santosh
Pallagatti, Mach Chen, 2024-10-07,
This document describes extensions to the Bidirectional Forwarding
Detection (BFD) protocol to measure BFD stability. Specifically, it
describes a mechanism for detection of BFD packet loss.
"Meticulous Keyed ISAAC for BFD Authentication", Alan DeKok, Mahesh
Jethanandani, Sonal Agarwal, Ashesh Mishra, Ankur Saxena, 2024-10-21,
This document describes a new BFD Authentication mechanism,
Meticulous Keyed ISAAC. This mechanism can be used to authenticate
BFD packets with less CPU time cost than using MD5 or SHA1, with the
tradeoff of decreased security. This mechanism cannot be used to
signal state changes, but it can be used as an authenticated signal
to maintain a session in the the "Up" state.
"BFD Encapsulated in Large Packets", Jeffrey Haas, Albert Fu, 2024-11-23,
The Bidirectional Forwarding Detection (BFD) protocol is commonly
used to verify connectivity between two systems. BFD packets are
typically very small. It is desirable in some circumstances to know
that not only is the path between two systems reachable, but also
that it is capable of carrying a payload of a particular size. This
document specifies how to implement such a mechanism using BFD in
Asynchronous mode.
YANG modules for managing this mechanism are also defined in this
document. These YANG modules augment the existing BFD YANG modules
defined in RFC 9314. The YANG modules in this document conform to
the Network Management Datastore Architecture (NMDA) (RFC 8342).
"Unaffiliated Bidirectional Forwarding Detection (BFD) Echo", Weiqiang
Cheng, Ruixue Wang, Xiao Min, Reshad Rahman, Raj Boddireddy, 2024-10-10,
Bidirectional Forwarding Detection (BFD) is a fault detection
protocol that can quickly determine a communication failure between
two forwarding engines. This document defines a use of the BFD Echo
where the local system supports BFD but the adjacent system does not
support BFD. BFD Control packet and its processing procedures can be
executed over the BFD Echo port where the adjacent system only loops
packets back to the local system.
This document updates RFC 5880 by defining a new method of BFD Echo-
Only without requiring an implementation to support the full BFD
protocol.
Bit Indexed Explicit Replication (bier)
---------------------------------------
"BGP Extensions for BIER", Xiaohu Xu, Mach Chen, Keyur Patel, IJsbrand
Wijnands, Tony Przygienda, Zhaohui Zhang, 2024-11-22,
Bit Index Explicit Replication (BIER) is a new multicast forwarding
architecture that doesn't require an explicit tree-building protocol
and doesn't require intermediate routers to maintain per-tree
multicast states. Some BIER-specific information and state, which
are only in proportion to the network but not per-tree, do need to be
advertised, calculated, and maintained. This document describes BGP
extensions for advertising the BIER information and methods for
calculating BIER states based on the advertisement in a single
Administrative Domain.
"Operations, Administration and Maintenance (OAM) Requirements for Bit
Index Explicit Replication (BIER) Layer", Greg Mirsky, Nagendra Nainar,
Mach Chen, Santosh Pallagatti, 2024-11-04,
This document describes a list of functional requirements toward
Operations, Administration and Maintenance (OAM) toolset in Bit Index
Explicit Replication (BIER) layer of a network.
"Path Maximum Transmission Unit Discovery (PMTUD) for Bit Index Explicit
Replication (BIER) Layer", Greg Mirsky, Tony Przygienda, Andrew Dolganow,
2024-07-04,
This document describes Path Maximum Transmission Unit Discovery
(PMTUD) in Bit Indexed Explicit Replication (BIER) layer.
"Performance Measurement (PM) with Marking Method in Bit Index Explicit
Replication (BIER) Layer", Greg Mirsky, Lianshu Zheng, Mach Chen, Giuseppe
Fioccola, 2024-11-07,
This document describes the applicability of a hybrid performance
measurement method for packet loss and packet delay measurements of a
multicast service through a Bit Index Explicit Replication domain.
"BIER Ping and Trace", Nagendra Nainar, Carlos Pignataro, Mach Chen, Greg
Mirsky, 2024-11-08,
Bit Index Explicit Replication (BIER) is an architecture that
provides optimal multicast forwarding through a "BIER domain" without
requiring intermediate routers to maintain any multicast-related per-
flow state. BIER also does not require any explicit tree-building
protocol for its operation. A multicast data packet enters a BIER
domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
The BFIR router adds a BIER header to the packet. The BIER header
contains a bit-string in which each bit represents exactly one BFER
to forward the packet to. The set of BFERs to which the multicast
packet needs to be forwarded is expressed by setting the bits that
correspond to those routers in the BIER header.
This document describes the mechanism and basic BIER OAM packet
format that can be used to perform failure detection and isolation on
the BIER data plane.
"YANG Data Model for BIER Protocol", Ran Chen, fangwei hu, Zheng Zhang,
[email protected], Mahesh Sivakumar, 2024-07-08,
This document defines a YANG data model that can be used to configure
and manage devices supporting Bit Index Explicit Replication"(BIER).
The YANG module in this document conforms to the Network Management
Datastore Architecture (NMDA).
"BGP Link-State extensions for BIER", Ran Chen, Zhaohui Zhang, Vengada
Govindan, IJsbrand Wijnands, 2024-10-12,
Bit Index Explicit Replication (BIER) is an architecture that
provides optimal multicast forwarding through a "BIER domain" without
requiring intermediate routers to maintain any multicast related per-
flow state. BIER also does not require any explicit tree-building
protocol for its operation. A multicast data packet enters a BIER
domain at a "Bit-Forwarding Ingress Router" (BFIR), and leaves the
BIER domain at one or more "Bit-Forwarding Egress Routers" (BFERs).
The BFIR router adds a BIER header to the packet. The BIER header
contains a bitstring in which each bit represents exactly one BFER to
forward the packet to. The set of BFERs to which the multicast
packet needs to be forwarded is expressed by setting the bits that
correspond to those routers in the BIER header.
BGP Link-State (BGP-LS) enables the collection of various topology
informations from the network, and the topology informations are used
by the controller to calculate the fowarding tables and then
propagate them onto the BFRs(instead of having each node to calculate
on its own) and that can be for both inter-as and intra-as
situations.
This document specifies extensions to the BGP Link-state address-
family in order to advertise the BIER informations.
"BIER Penultimate Hop Popping", Zhaohui Zhang, 2024-11-19,
This document specifies a mechanism for Penultimate Hop Popping (PHP)
in the Bit Index Explicit Replication (BIER) architecture. PHP
enables the removal of the BIER header by the penultimate router,
thereby reducing the processing burden on the final router in the
delivery path. This extension to BIER enhances operational
efficiency by optimizing packet forwarding in scenarios where the
final hop's capabilities or requirements necessitate such handling.
The document details the necessary extensions to the BIER
encapsulation and forwarding processes to support PHP, providing
guidance for implementation and deployment within BIER-enabled
networks.
"A YANG data model for Tree Engineering for Bit Index Explicit Replication
(BIER-TE)", Zheng Zhang, Cui(Linda) Wang, Ran Chen, fangwei hu, Mahesh
Sivakumar, chenhuanan, 2024-07-30,
This document defines a YANG data model for Tree Engineering for Bit
Index Explicit Replication (BIER-TE) configuration and operation.
"BIER Prefix Redistribute", Zheng Zhang, Bo Wu, Zhaohui Zhang, IJsbrand
Wijnands, Yisong Liu, Hooman Bidgoli, 2024-08-28,
This document defines a BIER proxy function to support one single
BIER sub-domain over multiple underlay routing protocol regions
(Autonomous Systems or IGP areas). A new BIER proxy range sub-TLV is
defined to redistribute BIER BFR-id information across the routing
regions.
"Tethering A BIER Router To A BIER Incapable Router", Zhaohui Zhang, Nils
Warnke, IJsbrand Wijnands, Daniel Awduche, 2024-10-04,
This document specifies optional enhancements to optimize the support
of Bit Index Explicit Replication (BIER) incapable routers in a BIER
domain by attaching (tethering) a BIER router to a BIER incapable
router, including procedures and ISIS/OSPF/BGP signaling extensions.
"BIER BFD", Quan Xiong, Greg Mirsky, fangwei hu, Chang Liu, Gyan Mishra,
2024-07-26,
Point to multipoint (P2MP) BFD is designed to verify multipoint
connectivity. This document specifies the application of P2MP BFD in
BIER network.
"BIER (Bit Index Explicit Replication) Redundant Ingress Router Failover",
Zheng Zhang, Greg Mirsky, Quan Xiong, Yisong Liu, Huanan Li, 2024-09-29,
This document describes a failover in the Bit Index Explicit
Replication domain with a redundant ingress router.
"Supporting BIER in IPv6 Networks (BIERin6)", Zheng Zhang, Zhaohui Zhang,
IJsbrand Wijnands, Mankamana Mishra, Hooman Bidgoli, Gyan Mishra,
2024-09-09,
BIER is a multicast forwarding architecture that does not require
per-flow state inside the network yet still provides optimal
replication. This document describes how the existing BIER
encapsulation specified in RFC 8296 works in a non-MPLS IPv6 network,
which is referred to as BIERin6. Specifically, like in an IPv4
network, BIER can work over L2 links directly or over tunnels. In
case of IPv6 tunneling, a new IP "Next Header" type is to be assigned
for BIER.
"BIER Fast ReRoute", Huaimo Chen, Mike McBride, Steffen Lindner, Michael
Menth, Aijun Wang, Gyan Mishra, 2024-02-01,
BIER is a scalable multicast overlay that utilizes a routing
underlay, e.g., IP, to build up its Bit Index Forwarding Tables
(BIFTs). This document proposes Fast Reroute for BIER (BIER-FRR).
It protects BIER traffic after detecting the failure of a link or
node in the core of a BIER domain until affected BIFT entries are
recomputed after reconvergence of the routing underlay. BIER-FRR is
applied locally at the point of local repair (PLR) and does not
introduce any per-flow state. The document specifies nomenclature
for BIER-FRR and gives examples for its integration in BIER
forwarding. Furthermore, it presents operation modes for BIER-FRR.
Link and node protection may be chosen as protection level.
Moreover, the backup strategies tunnel-based BIER-FRR and LFA-based
BIER-FRR are defined and compared.
Benchmarking Methodology (bmwg)
-------------------------------
"Multiple Loss Ratio Search", Maciek Konstantynowicz, Vratko Polak,
2024-10-21,
This document proposes extensions to [RFC2544] throughput search by
defining a new methodology called Multiple Loss Ratio search
(MLRsearch). MLRsearch aims to minimize search duration, support
multiple loss ratio searches, and enhance result repeatability and
comparability.
The primary reason for extending [RFC2544] is to address the
challenges and requirements presented by the evaluation and testing
the data planes of software-based networking systems.
To give users more freedom, MLRsearch provides additional
configuration options such as allowing multiple short trials per load
instead of one large trial, tolerating a certain percentage of trial
results with higher loss, and supporting the search for multiple
goals with varying loss ratios.
"A YANG Data Model for Network Tester Management", Vladimir Vassilev,
2024-10-21,
This document introduces new YANG model for use in network
interconnect testing containing modules of traffic generator and
traffic analyzer.
"Benchmarking Methodology for Stateful NATxy Gateways using RFC 4814
Pseudorandom Port Numbers", Gabor Lencse, Keiichi Shima, 2024-06-16,
RFC 2544 has defined a benchmarking methodology for network
interconnect devices. RFC 5180 addressed IPv6 specificities and it
also provided a technology update but excluded IPv6 transition
technologies. RFC 8219 addressed IPv6 transition technologies,
including stateful NAT64. However, none of them discussed how to
apply RFC 4814 pseudorandom port numbers to any stateful NATxy
(NAT44, NAT64, NAT66) technologies. This document discusses why
using pseudorandom port numbers with stateful NATxy gateways is a
difficult problem. It recommends a solution limiting the port number
ranges and using two test phases (phase 1 and phase 2). It is shown
how the classic performance measurement procedures (e.g. throughput,
frame loss rate, latency, etc.) can be carried out. New performance
metrics and measurement procedures are also defined for measuring
maximum connection establishment rate, connection tear-down rate, and
connection tracking table capacity.
"Considerations for Benchmarking Network Performance in Containerized
Infrastructures", Tran Ngoc, Sridhar Rao, Jangwon Lee, Younghan Kim,
2024-11-04,
Recently, the Benchmarking Methodology Working Group has extended the
laboratory characterization from physical network functions (PNFs) to
virtual network functions (VNFs). Considering the network function
implementation trend moving from virtual machine-based to container-
based, system configurations and deployment scenarios for
benchmarking will be partially changed by how the resources
allocation and network technologies are specified for containerized
network functions. This draft describes additional considerations
for benchmarking network performance when network functions are
containerized and performed in general-purpose hardware.
"Benchmarking Methodology for Segment Routing", Giuseppe Fioccola, Eduard,
Paolo Volpato, Luis Contreras, Bruno Decraene, 2024-10-01,
This document defines a methodology for benchmarking Segment Routing
(SR) performance for Segment Routing over IPv6 (SRv6) and MPLS (SR-
MPLS). It builds upon RFC 2544, RFC 5180, RFC 5695 and RFC 8402.
Calendaring Extensions (calext)
-------------------------------
"JSCalendar: Converting from and to iCalendar", Robert Stepanek,
2024-11-12,
This document defines how to convert calendaring information between
the JSCalendar and iCalendar data formats. It considers every
JSCalendar and iCalendar element registered at IANA at the time of
publication. It defines conversion rules for all elements that are
common to both formats, as well as how convert arbitrary or unknown
JSCalendar and iCalendar elements.
Note
This note is to be removed before publishing as an RFC.
This document is unfinished. The term TBD stands for any unknown
item.
"Calendar subscription upgrades", Michael Douglass, 2024-07-06,
This specification updates RFC5545 to add the value DELETED to the
STATUS property.
This specification also adds values to the Preferences Registry
defined in RFC7240 to add the subscribe-enhanced-get and limit
preferences and to the link relations directory defined in RFC8288.
Additionally, this specification defines a new enhanced GET protocol
to allow the updating of a cached resource without fetching all the
data.
"VPOLL: Consensus Scheduling Component for iCalendar", Eric York, Michael
Douglass, 2024-10-14,
This specification introduces a new RFC5545 iCalendar component which
allows for consensus scheduling, that is, voting on a number of
alternative meeting or task alternatives.
"Task Extensions to iCalendar", Adrian Apthorp, Michael Douglass,
2024-07-30,
The Internet Calendaring and Scheduling Core Object Specification
(iCalendar) (RFC5545) VTODO calendar component has been seen as the
poor relation of VEVENT - useful only for personal reminders and to-
do lists.
This document updates and defines extensions to VTODO to provide
improved status tracking, scheduling and specification of tasks to
allow its use in other contexts, such as process control and project
management.
It also defines how Calendaring Extensions to WebDAV (CalDAV) (RFC
4791) servers can be extended to support certain automated task
management behaviours.
"iTip using PARTICIPANT only", Michael Douglass, 2024-10-16,
This specification defines updates to RFC5546 iTip which allow
scheduling using the "PARTICIPANT" calendar components specified in
RFC9073.
New properties are also defined for use within the "PARTICIPANT"
calendar component.
Computing-Aware Traffic Steering (cats)
---------------------------------------
"Computing-Aware Traffic Steering (CATS) Problem Statement, Use Cases, and
Requirements", Kehan Yao, Luis Contreras, Hang Shi, Shuai Zhang, Qing An,
2024-10-21,
Distributed computing is a tool that service providers can use to
achieve better service response time and optimized energy
consumption. In such a distributed computing environment, providing
services by utilizing computing resources hosted in various computing
facilities aids support of services such as computationally intensive
and delay sensitive services. Ideally, compute services are balanced
across servers and network resources to enable higher throughput and
lower response times. To achieve this, the choice of server and
network resources should consider metrics that are oriented towards
compute capabilities and resources instead of simply dispatching the
service requests in a static way or optimizing solely on connectivity
metrics. The process of selecting servers or service instance
locations, and of directing traffic to them on chosen network
resources is called "Computing-Aware Traffic Steering" (CATS).
This document provides the problem statement and the typical
scenarios for CATS, which shows the necessity of considering more
factors when steering traffic to the appropriate computing resource
to best meet the customer's expectations and deliver the requested
service.
"A Framework for Computing-Aware Traffic Steering (CATS)", Cheng Li,
Zongpeng Du, Mohamed Boucadair, Luis Contreras, John Drake, 2024-10-17,
This document describes a framework for Computing-Aware Traffic
Steering (CATS). Particularly, the document identifies a set of CATS
components, describes their interactions, and exemplifies the
workflow of the control and data planes.
Concise Binary Object Representation Maintenance and Extensions (cbor)
----------------------------------------------------------------------
"Packed CBOR", Carsten Bormann, Mikolai Guetschow, 2024-09-01,
The Concise Binary Object Representation (CBOR, RFC 8949 == STD 94)
is a data format whose design goals include the possibility of
extremely small code size, fairly small message size, and
extensibility without the need for version negotiation.
CBOR does not provide any forms of data compression. CBOR data
items, in particular when generated from legacy data models, often
allow considerable gains in compactness when applying data
compression. While traditional data compression techniques such as
DEFLATE (RFC 1951) can work well for CBOR encoded data items, their
disadvantage is that the recipient needs to decompress the compressed
form to make use of the data.
This specification describes Packed CBOR, a simple transformation of
a CBOR data item into another CBOR data item that is almost as easy
to consume as the original CBOR data item. A separate decompression
step is therefore often not required at the recipient.
// The present version (-13) is a refresh of the implementation draft
// -12 with minor editorial improvements.
"CBOR Extended Diagnostic Notation (EDN)", Carsten Bormann, 2024-11-03,
The Concise Binary Object Representation (CBOR) (STD 94, RFC 8949) is
a data format whose design goals include the possibility of extremely
small code size, fairly small message size, and extensibility without
the need for version negotiation.
In addition to the binary interchange format, CBOR from the outset
(RFC 7049) defined a text-based "diagnostic notation" in order to be
able to converse about CBOR data items without having to resort to
binary data. RFC 8610 extended this into what is known as Extended
Diagnostic Notation (EDN).
This document consolidates the definition of EDN, sets forth a
further step of its evolution, and is intended to serve as a single
reference target in specifications that use EDN.
It specifies an extension point for adding application-oriented
extensions to the diagnostic notation. It then defines two such
extensions that enhance EDN with text representations of epoch-based
date/times and of IP addresses and prefixes (RFC 9164).
A few further additions close some gaps in usability. The document
modifies one extension originally specified in Appendix G.4 of RFC
8610 to enable further increasing usability. To facilitate tool
interoperation, this document specifies a formal ABNF grammar, and it
adds media types.
// (This "cref" paragraph will be removed by the RFC editor:) The
// present revision -13 reflects the branches "roll-up" and "roll-up-
// 2" in the repository, an attempt to contain the entire
// specification of EDN in this document, instead of describing
// updates to the existing documents RFC 8949 and RFC 8610.
// Editorial work on the branch "roll-up-2" might continue. The
// exact reflection of this document being a replacement for both
// Section 8 of RFC 8949 and Appendix G of RFC 8610 needs to be
// recorded in the metadata and in abstract and introduction.
"More Control Operators for CDDL", Carsten Bormann, 2024-11-03,
The Concise Data Definition Language (CDDL), standardized in RFC
8610, provides "control operators" as its main language extension
point. RFCs have added to this extension point both in an
application-specific and a more general way.
The present document defines a number of additional generally
applicable control operators for text conversion (Bytes, Integers,
JSON, Printf-style formatting) and for an operation on text.
"CDDL Module Structure", Carsten Bormann, Brendan Moran, 2024-09-01,
At the time of writing, the Concise Data Definition Language (CDDL)
is defined by RFC 8610 and RFC 9165. The latter has used the
extension point provided in RFC 8610, the _control operator_.
As CDDL is being used in larger projects, the need for features has
become known that cannot be easily mapped into this single extension
point.
The present document defines a backward- and forward-compatible way
to add a module structure to CDDL.
"CBOR Common Deterministic Encoding (CDE)", Carsten Bormann, 2024-10-16,
CBOR (STD 94, RFC 8949) defines "Deterministically Encoded CBOR" in
its Section 4.2, providing some flexibility for application specific
decisions. To facilitate Deterministic Encoding to be offered as a
selectable feature of generic encoders, the present document defines
a CBOR Common Deterministic Encoding (CDE) Profile that can be shared
by a large set of applications with potentially diverging detailed
requirements. It also defines "Basic Serialization", which stops
short of the potentially more onerous requirements that make CDE
fully deterministic, while employing most of its reductions of the
variability needing to be handled by decoders.
"External References to Values in CBOR Diagnostic Notation (EDN)", Carsten
Bormann, 2024-06-27,
The Concise Binary Object Representation (CBOR, RFC 8949) is a data
format whose design goals include the possibility of extremely small
code size, fairly small message size, and extensibility without the
need for version negotiation.
CBOR diagnostic notation (EDN) is widely used to represent CBOR data
items in a way that is accessible to humans, for instance for
examples in a specification. At the time of writing, EDN did not
provide mechanisms for composition of such examples from multiple
components or sources. This document uses EDN application extensions
to provide two such mechanisms, both of which insert an imported data
item into the data item being described in EDN:
The e'' application extension provides a way to import data items,
particularly constant values, from a CDDL model (which itself has
ways to provide composition).
The ref'' application extension provides a way to import data items
that are described in EDN.
Common Control and Measurement Plane (ccamp)
--------------------------------------------
"A YANG Data Model for Optical Transport Network Topology", Haomian Zheng,
Italo Busi, Xufeng Liu, Sergio Belotti, Oscar de Dios, 2024-11-07,
This document defines a YANG data model for representing, retrieving,
and manipulating Optical Transport Network (OTN) topologies. It is
independent of control plane protocols and captures topological and
resource-related information pertaining to OTN.
"OTN Tunnel YANG Model", Haomian Zheng, Italo Busi, Sergio Belotti, Victor
Lopez, Yunbin Xu, 2024-06-06,
This document describes the YANG data model for tunnels in OTN TE
networks. The model can be used to do the configuration in order to
establish the tunnel in OTN network. This work is independent with
the control plane protocols.
"A YANG Data Model for Flexi-Grid Optical Networks", Universidad de Madrid,
Daniel Burrero, Daniel King, Young Lee, Haomian Zheng, 2024-09-12,
This document defines a YANG module for managing flexi-grid optical
networks. The model defined in this document specifies a flexi-grid
traffic engineering database that is used to describe the topology of
a flexi-grid network. It is based on and augments existing YANG
models that describe network and traffic engineering topologies.
"A YANG Data Model for L1 Connectivity Service Model (L1CSM)", Young Lee,
Kwang-koog Lee, Haomian Zheng, Oscar de Dios, Daniele Ceccarelli,
2024-04-11,
This document provides a YANG Layer 1 Connectivity Service Model
(L1CSM).
This model can be utilized by a customer network controller to
initiate a connectivity service request as well as to retrieve
service states for a Layer 1 network controller communicating with
its customer network controller. This YANG model is in compliance of
Network Management Datastore Architecture (NMDA).
"A YANG model to manage the optical interface parameters for an external
transponder in a WDM network", Gabriele Galimberti, Dharini Hiremagalur,
Gert Grammel, Roberto Manzotti, Dirk Breuer, 2024-07-05,
This memo defines a Yang model related to the Optical Transceiver
parameters characterising coherent 100G and above interfaces. 100G
and above Transceivers support coherent modulation, multiple
modulation formats, multiple FEC codes including some not yet
specified (or in phase of specification by) ITU-T G.698.2 or any
other ITU-T recommendation. Use cases are described in RFC7698. Is
to be noted that the Transceivers can be located on the Transponders
(optical layer) or on the Router (in general packet layer) in form of
Pluggable modules.
The Yang model defined in this memo can be used for Optical
Parameters monitoring and/or configuration of the endpoints of a
multi-vendor IaDI optical link. The use of this model does not
guarantee interworking of transceivers over a DWDM. Optical path
feasibility and interoperability has to be determined by tools and
algorithms outside the scope of this document. The purpose of this
model is to program interface parameters to consistently configure
the mode of operation of transceivers.
"A YANG Data Model for Optical Impairment-aware Topology", Dieter Beller,
Esther Le Rouzic, Sergio Belotti, Gabriele Galimberti, Italo Busi,
2024-10-21,
In order to provision an optical connection through optical networks,
a combination of path continuity, resource availability, and
impairment constraints must be met to determine viable and optimal
paths through the network. The determination of appropriate paths is
known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
for WSON, while it is known as Impairment-Aware Routing and Spectrum
Assignment (IA-RSA) for SSON.
This document provides a YANG data model for the impairment-aware TE
topology in optical networks.
"A YANG Data Model for Transport Network Client Signals", Haomian Zheng,
Aihua Guo, Italo Busi, Anton Snitser, Chaode Yu, 2024-08-01,
A transport network is a server-layer network to provide connectivity
services to its client. The topology and tunnel information in the
transport layer has already been defined by generic Traffic-
engineered models and technology-specific models (e.g., OTN, WSON).
However, how the client signals are accessing to the network has not
been described. These information is necessary to both client and
provider.
This draft describes how the client signals are carried over
transport network and defines YANG data models which are required
during configuration procedure. More specifically, several client
signal (of transport network) models including ETH, STM-n, FC and so
on, are defined in this draft.
"Common YANG Data Types for Layer 1 Networks", Haomian Zheng, Italo Busi,
2024-02-23,
This document defines a collection of common common data types,
identities, and groupings in the YANG data modeling language. These
derived common common data types, identities, and groupings are
intended to be imported by modules that model Layer 1 configuration
and state capabilities. The Layer 1 types are representative of
Layer 1 client signals applicable to transport networks, such as
Optical Transport Networks (OTN). The Optical Transport Network
(OTN) data structures are included in this document as Layer 1 types.
"A YANG Data Model for Ethernet TE Topology", Chaode Yu, Haomian Zheng,
Aihua Guo, Italo Busi, Yunbin Xu, Yang Zhao, Xufeng Liu, 2024-10-14,
This document describes a YANG data model for Ethernet networks when
used either as a client-layer network of an underlay transport
network (e.g., an Optical Transport Network (OTN)) or as a transport
network itself.
"Framework and Data Model for OTN Network Slicing", Aihua Guo, Luis
Contreras, Sergio Belotti, Reza Rokui, Yunbin Xu, Yang Zhao, Xufeng Liu,
2024-07-07,
The requirement of slicing network resources with desired quality of
service is emerging at every network technology, including the
Optical Transport Networks (OTN). As a part of the transport
network, OTN can provide hard pipes with guaranteed data isolation
and deterministic low latency, which are highly demanded in the
Service Level Agreement (SLA).
This document describes a framework for OTN network slicing and
defines YANG data models with OTN technology-specific augments
deployed at both the north and south bound of the OTN network slice
controller. Additional YANG data model augmentations will be defined
in a future version of this draft.
"Common YANG Data Types for Layer 0 Networks", Sergio Belotti, Italo Busi,
Dieter Beller, Esther Le Rouzic, Aihua Guo, 2024-07-25,
This document defines a collection of common data types, identities,
and groupings in the YANG data modeling language. These common types
and groupings, derived from the built-in YANG data types, identities,
and groupings are intended to be imported by modules that model Layer
0 configuration and state capabilities, such as Wavelength Switched
Optical Networks (WSONs) and flexi-grid Dense Wavelength Division
Multiplexing (DWDM) networks.
This document obsoletes RFC 9093 by replacing the YANG module it
contained with a new revision that includes additional YANG data
types, identities and groupings.
"YANG Data Model for FlexE Management", Minxue Wang, Liuyan Han, Xuesong
Geng, Jin Zhou, Luis Contreras, Xufeng Liu, 2024-11-25,
This document defines a service provider targeted YANG data model for
the configuration and management of a Flex Ethernet (FlexE) network,
including FlexE group and FlexE client. The YANG module in this
document conforms to the Network Management Datastore Architecture
(NMDA).
"A YANG Data Model for requesting Path Computation in an Optical Transport
Network (OTN)", Italo Busi, Aihua Guo, Sergio Belotti, 2024-10-21,
This document provides a mechanism to request path computation in an
Optical Transport Network (OTN) by augmenting the Remote Procedure
Calls (RPCs) defined in RFC YYYY.
[RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
draft-ietf-teas-yang-path-computation once it has been published.
"YANG Data Models for requesting Path Computation in WDM Optical Networks",
Italo Busi, Aihua Guo, Sergio Belotti, 2024-08-29,
This document provides a mechanism to request path computation in
Wavelength-Division Multiplexing (WDM) optical networks composed of
Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
Wavelength Division Multiplexing (DWDM) switched technologies. This
model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.
[RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
draft-ietf-teas-yang-path-computation once it has been published.
"A YANG Data Model for WDM Tunnels", Aihua Guo, Sergio Belotti, Gabriele
Galimberti, Universidad de Madrid, Daniel Burrero, 2024-10-21,
This document defines a YANG data model for the provisioning and
management of Traffic Engineering (TE) tunnels and Label Switched
Paths (LSPs) in Optical Networks (Wavelength Switched Optical
Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
(DWDM) Networks).
The YANG data model defined in this document conforms to the Network
Management Datastore Architecture (NMDA).
"Use cases, Network Scenarios and gap analysis for Packet Optical
Integration (POI) with coherent plugables under ACTN Framework", Oscar de
Dios, Jean-Francois Bouquier, Julien Meuric, Gyan Mishra, Gabriele
Galimberti, 2024-10-21,
This document provides general overarching guidelines for control and
management of packet over optical converged networks with coherent
pluggables and focuses on operators' use cases and network scenarios.
It provides a set of use cases which are needed for the control and
management of the packet over optical networks which comprise devices
with mixes of packet and optical functions where the optical
functions may be provided on coherent pluggables. The document
provides a gap analysis to solve the use cases.
"Integrating YANG Configuration and Management into an Abstraction and
Control of TE Networks (ACTN) System for Optical Networks",
谭艳霞, XingZhao, Chaode Yu, Daniel King, Adrian Farrel,
2024-11-28,
Many network technologies are operated as Traffic Engineered (TE)
networks. Optical networks are a particular case, and have complex
technology-specific details.
Abstraction and Control of TE Networks (ACTN) is a management
architecture that abstracts TE network resources to provide a limited
network view for customers to request and self-manage connectivity
services. It also provides functional components to orchestrate and
operate the network.
Management of legacy optical networks is often provided via Fault,
Configuration, Accounting, Performance, and Security (known as FCAPS)
using mechanisms such as the Multi-Technology Operations System
Interface (MTOSI) and the Common Object Request Broker Architecture
(CORBA). FCAPS can form a critical part of configuration management
and service assurance for network operations. However, the ACTN
architecture as described in RFC 8453 does not include consideration
of FCAPS.
This document enhances the ACTN architecture as applied to optical
networks by introducing support for FCAPS. It considers which
elements of existing IETF YANG work can be used to solve existing
scenarios and emerging technologies, and what new work may be needed.
In doing so, this document adds rich-detail network management to the
ACTN architecture. This enhanced architecture may then be used to
evolve networks from CORBA and MTOSI FCAPS interfaces to IETF-based
YANG and RESTful APIs.
Congestion Control Working Group (ccwg)
---------------------------------------
"Specifying New Congestion Control Algorithms", Martin Duke, Gorry
Fairhurst, 2024-08-21,
This document replaces RFC 5033, which discusses the principles and
guidelines for standardzing new congestion control algorithms. It
seeks to ensure that proposed congestion control algorithms operate
without harm and efficiently alongside other algorithms in the global
Internet. It emphasizes the need for comprehensive testing and
validation to prevent adverse interactions with existing flows. This
document provides a framework for the development and assessment of
congestion control mechanisms, promoting stability across diverse
network environments. It obsoletes RFC5033 to reflect changes in the
congestion control landscape.
"BBR Congestion Control", Neal Cardwell, Ian Swett, Joseph Beshay,
2024-10-21,
This document specifies the BBR congestion control algorithm. BBR
("Bottleneck Bandwidth and Round-trip propagation time") uses recent
measurements of a transport connection's delivery rate, round-trip
time, and packet loss rate to build an explicit model of the network
path. BBR then uses this model to control both how fast it sends
data and the maximum volume of data it allows in flight in the
network at any time. Relative to loss-based congestion control
algorithms such as Reno [RFC5681] or CUBIC [RFC9438], BBR offers
substantially higher throughput for bottlenecks with shallow buffers
or random losses, and substantially lower queueing delays for
bottlenecks with deep buffers (avoiding "bufferbloat"). BBR can be
implemented in any transport protocol that supports packet-delivery
acknowledgment. Thus far, open source implementations are available
for TCP [RFC9293] and QUIC [RFC9000]. This document specifies
version 3 of the BBR algorithm, BBRv3.
Content Delivery Networks Interconnection (cdni)
------------------------------------------------
"Content Delivery Network Interconnection (CDNI) Control Interface /
Triggers 2nd Edition", Nir Sopher, Ori Finkelman, Sanjay Mishra, Jay
Robertson, Alan Arolovitch, 2024-10-21,
This document obsoletes RFC8007. The document describes the part of
Content Delivery Network Interconnection (CDNI) Control interface
that allows a CDN to trigger activity in an interconnected CDN that
is configured to deliver content on its behalf. The upstream CDN MAY
use this mechanism to request that the downstream CDN preposition
metadata or content as well as request that it invalidate or purge
metadata or content. The upstream CDN MAY monitor the status of
activity that it has triggered in the downstream CDN.
"CDNI Capacity Capability Advertisement Extensions", Andrew Ryan, Ben
Rosenblum, Nir Sopher, 2024-10-21,
The Content Delivery Networks Interconnection (CDNI) Capacity
Capability Advertisement Extensions define a set of additional
Capability Objects that provide information about current downstream
CDN (dCDN) utilization and specified usage limits to the delegating
upstream CDN (uCDN) in order to inform traffic delegation decisions.
This document supplements the CDNI Capability Objects, defined in RFC
8008 as part of the Footprints & Capabilities Advertisement Interface
(FCI), with two additional Capability Objects: FCI.CapacityLimits and
FCI.Telemetry.
"CDNI Cache Control Metadata", Will Power, Glenn Goldstein, 2024-07-22,
This specification adds new Cache Control objects that complement the
basic Cache Control Metadata object defined in RFC8006, providing
content providers and upstream Content Delivery Networks (uCDNs) more
fine-grained control over downstream CDN (dCDN) caching. Use cases
include overriding or adjusting cache control headers from the
Content Service Provider (CSP) source or origin, bypassing caching
altogether, or altering cache keys with dynamically generated values.
"CDNI Edge Control Metadata", Alfonso Siloniz, Glenn Goldstein, 2024-07-08,
This specification defines configuration metadata objects related to
controlling edge access to resources via content delivery networks
(CDNs) and Open Caching systems. Configuring Cross-Origin Resource
Sharing (CORS) access rules and the dynamic generation of CORS
headers is a key feature of typical configurations, as are the
ability to define response body compression rules and client
connection timeouts.
"CDNI Protected Secrets Metadata", Ben Rosenblum, 2024-07-07,
This document defines a simple mechanism for protected secret data
(such as salt values or encryption keys) that may be embedded in
configuration metadata or capabilities advertisements.
"CDNI Logging Extensions", Ben Rosenblum, Omar Ramadan, Kenton Seward,
2024-07-07,
This document defines a set of extensions to CDNI for supporting
transmission of transaction logs in both push and pull operational
modes, new log container formats and log record formats, new logging
fields, and metadata for describing the transformation, obfuscation,
and encryption of log record fields.
"Content Delivery Network Interconnection (CDNI) Named Footprints", Alan
Arolovitch, 2024-07-08,
Open Caching architecture is a use case of Content Delivery Networks
Interconnection (CDNI) in which the commercial Content Delivery
Network (CDN) is the upstream CDN (uCDN) and the ISP caching layer
serves as the downstream CDN (dCDN). This document extends the
Footprint & Capabilities Advertisement Interface (FCI) defined in
RFC8008, to allow advertising of named footprint objects, that can be
referenced in a consistent manner from Metadata Interface (MI), also
defined in RFC8006, as well as from the FCI itself as well as
additional interfaces in the Open Caching architecture. This
document also supplements the CDNI Metadata Footprint Types defined
in RFC8006 and modifies the CDNI operation as described in RFC7336.
"CDNI Client Access Control Metadata", Pankaj Chaudhari, Glenn Goldstein,
Will Power, Arnon Warshavsky, 2024-07-22,
This specification adds to the basic client access control metadata
in RFC8006, providing content providers and upstream content delivery
networks (uCDNs) extended capabilities in defining location and time
window restrictions. Support is also provided to define required
Transport Layer Security (TLS) certificates and encryption levels.
Codec Encoding for LossLess Archiving and Realtime transmission (cellar)
------------------------------------------------------------------------
"Matroska Media Container Tag Specifications", Steve Lhomme, Moritz Bunkus,
Dave Rice, 2024-11-24,
This document defines the Matroska tags, namely the tag names and
their respective semantic meaning.
"Free Lossless Audio Codec", Martijn van Beurden, Andrew Weaver,
2024-01-14,
This document defines the Free Lossless Audio Codec (FLAC) format and
its streamable subset. FLAC is designed to reduce the amount of
computer storage space needed to store digital audio signals without
losing information in doing so (i.e., lossless). FLAC is free in the
sense that its specification is open and its reference implementation
is open-source. Compared to other lossless (audio) coding formats,
FLAC is a format with low complexity and can be coded to and from
with little computing resources. Decoding of FLAC has seen many
independent implementations on many different platforms, and both
encoding and decoding can be implemented without needing floating-
point arithmetic.
"Matroska Media Container Control Track Specifications", Steve Lhomme,
Moritz Bunkus, Dave Rice, 2024-08-27,
This document defines the Control Track usage found in the Matroska
container.
"Matroska Media Container Chapter Codecs Specifications", Steve Lhomme,
Moritz Bunkus, Dave Rice, 2024-08-27,
This document defines common Matroska Chapter Codecs, the basic
Matroska Script and the DVD inspired DVD menu [DVD-Video].
Crypto Forum (cfrg)
-------------------
"KangarooTwelve and TurboSHAKE", Benoit Viguier, David Wong, Gilles Van
Assche, Quynh Dang, Joan Daemen, 2024-11-07,
This document defines four eXtendable Output Functions (XOF), hash
functions with output of arbitrary length, named TurboSHAKE128,
TurboSHAKE256, KT128 and KT256.
All four functions provide efficient and secure hashing primitives,
and the last two are able to exploit the parallelism of the
implementation in a scalable way.
This document is a product of the Crypto Forum Research Group. It
builds up on the definitions of the permutations and of the sponge
construction in [FIPS 202], and is meant to serve as a stable
reference and an implementation guide.
"Additional Parameter sets for HSS/LMS Hash-Based Signatures", Scott
Fluhrer, Quynh Dang, 2024-10-21,
This note extends HSS/LMS (RFC 8554) by defining parameter sets by
including additional hash functions. These include hash functions
that result in signatures with significantly smaller size than the
signatures using the current parameter sets, and should have
sufficient security.
This document is a product of the Crypto Forum Research Group (CFRG)
in the IRTF.
"CPace, a balanced composable PAKE", Michel Abdalla, Bjoern Haase, Julia
Hesse, 2024-10-14,
This document describes CPace which is a protocol that allows two
parties that share a low-entropy secret (password) to derive a strong
shared key without disclosing the secret to offline dictionary
attacks. The CPace protocol was tailored for constrained devices and
can be used on groups of prime- and non-prime order.
"Usage Limits on AEAD Algorithms", Felix Guenther, Martin Thomson,
Christopher Wood, 2024-10-09,
An Authenticated Encryption with Associated Data (AEAD) algorithm
provides confidentiality and integrity. Excessive use of the same
key can give an attacker advantages in breaking these properties.
This document provides simple guidance for users of common AEAD
functions about how to limit the use of keys in order to bound the
advantage given to an attacker. It considers limits in both single-
and multi-key settings.
"The OPAQUE Augmented PAKE Protocol", Daniel Bourdrez, Hugo Krawczyk, Kevin
Lewi, Christopher Wood, 2024-11-21,
This document describes the OPAQUE protocol, an augmented (or
asymmetric) password-authenticated key exchange (aPAKE) that supports
mutual authentication in a client-server setting without reliance on
PKI and with security against pre-computation attacks upon server
compromise. In addition, the protocol provides forward secrecy and
the ability to hide the password from the server, even during
password registration. This document specifies the core OPAQUE
protocol and one instantiation based on 3DH. This document is a
product of the Crypto Forum Research Group (CFRG) in the IRTF.
"Verifiable Distributed Aggregation Functions", Richard Barnes, David Cook,
Christopher Patton, Phillipp Schoppmann, 2024-11-02,
This document describes Verifiable Distributed Aggregation Functions
(VDAFs), a family of multi-party protocols for computing aggregate
statistics over user measurements. These protocols are designed to
ensure that, as long as at least one aggregation server executes the
protocol honestly, individual measurements are never seen by any
server in the clear. At the same time, VDAFs allow the servers to
detect if a malicious or misconfigured client submitted an invalid
measurement. Two concrete VDAFs are specified, one for general-
purpose aggregation (Prio3) and another for heavy hitters (Poplar1).
"Key Blinding for Signature Schemes", Frank Denis, Edward Eaton, Tancrede
Lepoint, Christopher Wood, 2024-09-23,
This document describes extensions to existing digital signature
schemes for key blinding. The core property of signing with key
blinding is that a blinded public key and all signatures produced
using the blinded key pair are independent of the unblinded key pair.
Moreover, signatures produced using blinded key pairs are
indistinguishable from signatures produced using unblinded key pairs.
This functionality has a variety of applications, including Tor onion
services and privacy-preserving airdrop for bootstrapping
cryptocurrency systems.
"The AEGIS Family of Authenticated Encryption Algorithms", Frank Denis,
Samuel Lucas, 2024-10-14,
This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
AEGIS-256X AES-based authenticated encryption algorithms designed for
high-performance applications.
The document is a product of the Crypto Forum Research Group (CFRG).
It is not an IETF product and is not a standard.
Discussion Venues
This note is to be removed before publishing as an RFC.
Source for this draft and an issue tracker can be found at
https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.
"Hedged ECDSA and EdDSA Signatures", John Mattsson, Erik Thormarker, Sini
Ruohomaa, 2024-11-06,
Deterministic elliptic-curve signatures such as deterministic ECDSA
and EdDSA have gained popularity over randomized ECDSA as their
security does not depend on a source of high-quality randomness.
Recent research, however, has found that implementations of these
signature algorithms may be vulnerable to certain side-channel and
fault injection attacks due to their deterministic nature. One
countermeasure to such attacks is hedged signatures where the
calculation of the per-message secret number includes both fresh
randomness and the message. This document updates RFC 6979 and RFC
8032 to recommend hedged constructions in deployments where side-
channel attacks and fault injection attacks are a concern. The
updates are invisible to the validator of the signature and
compatible with existing ECDSA and EdDSA validators.
"The BBS Signature Scheme", Tobias Looker, Vasilis Kalos, Andrew Whitehead,
Mike Lodder, 2024-09-23,
This document describes the BBS Signature scheme, a secure, multi-
message digital signature protocol, supporting proving knowledge of a
signature while selectively disclosing any subset of the signed
messages. Concretely, the scheme allows for signing multiple
messages whilst producing a single, constant size, digital signature.
Additionally, the possessor of a BBS signatures is able to create
zero-knowledge, proofs-of-knowledge of a signature, while selectively
disclosing subsets of the signed messages. Being zero-knowledge, the
BBS proofs do not reveal any information about the undisclosed
messages or the signature it self, while at the same time,
guarantying the authenticity and integrity of the disclosed messages.
"Deterministic Nonce-less Hybrid Public Key Encryption", Dan Harkins,
2024-09-09,
This document describes enhancements to the Hybrid Public Key
Encryption standard published by CFRG. These include use of "compact
representation" of relevant public keys, support for key-wrapping,
and two ways to address the use of HPKE on lossy networks: a
determinstic, nonce-less AEAD scheme, and use of a rolling sequence
number with existing AEAD schemes.
"Properties of AEAD Algorithms", Andrey Bozhko, 2024-10-11,
Authenticated Encryption with Associated Data (AEAD) algorithms
provide both confidentiality and integrity of data. The widespread
use of AEAD algorithms in various applications has led to an
increased demand for AEAD algorithms with additional properties,
driving research in the field. This document provides definitions
for the most common of those properties, aiming to improve
consistency in the terminology used in documentation. This document
is a product of the Crypto Forum Research Group.
"Implementation Guidance for the PKCS #1 RSA Cryptography Specification",
Alicja Kario, 2024-09-03,
This document specifies additions and amendments to RFC 8017.
Specifically, it provides guidance to implementers of the standard to
protect against side-channel attacks. It also deprecates the RSAES-
PKCS-v1_5 encryption scheme, but provides an alternative depadding
algorithm that protects against side-channel attacks raising from
users of vulnerable APIs. The purpose of this specification is to
increase security of RSA implementations.
"Partially Blind RSA Signatures", Ghous Amjad, Scott Hendrickson,
Christopher Wood, Kevin Yeo, 2024-09-30,
This document specifies a blind RSA signature protocol that supports
public metadata. It is an extension to the RSABSSA protocol recently
specified by the CFRG.
Discussion Venues
This note is to be removed before publishing as an RFC.
Discussion of this document takes place on the Crypto Forum Research
Group mailing list ([email protected]), which is archived at
https://mailarchive.ietf.org/arch/search/?email_list=cfrg.
Source for this draft and an issue tracker can be found at
https://github.com/chris-wood/draft-amjad-cfrg-partially-blind-rsa.
Computing in the Network Research Group (coinrg)
------------------------------------------------
"Use Cases for In-Network Computing", Ike Kunze, Klaus Wehrle, Dirk
Trossen, Marie-Jose Montpetit, Xavier de Foy, David Griffin, Miguel Rio,
2024-09-12,
Computing in the Network (COIN) comes with the prospect of deploying
processing functionality on networking devices, such as switches and
network interface cards. While such functionality can be beneficial,
it has to be carefully placed into the context of the general
Internet communication and it needs to be clearly identified where
and how those benefits apply.
This document presents some use cases to demonstrate how a number of
salient COIN-related applications can benefit from COIN.
Furthermore, to guide research on COIN, it further identifies
essential research questions and outlines desirable capabilities that
COIN systems addressing the use cases may need to support. It is a
product of the Computing in the Network Research Group (COINRG). It
is not an IETF product and it is not a standard.
Constrained RESTful Environments (core)
---------------------------------------
"A publish-subscribe architecture for the Constrained Application Protocol
(CoAP)", Jaime Jimenez, Michael Koster, Ari Keranen, 2024-10-21,
This document describes a publish-subscribe architecture for the
Constrained Application Protocol (CoAP), extending the capabilities
of CoAP communications for supporting endpoints with long breaks in
connectivity and/or up-time. CoAP clients publish on and subscribe
to a topic via a corresponding topic resource at a CoAP server acting
as broker.
"CoAP Management Interface (CORECONF)", Michel Veillette, Peter van der
Stok, Alexander Pelov, Andy Bierman, Carsten Bormann, 2024-11-03,
This document describes a network management interface for
constrained devices and networks, called CoAP Management Interface
(CORECONF). The Constrained Application Protocol (CoAP) is used to
access datastore and data node resources specified in YANG, or SMIv2
converted to YANG. CORECONF uses the YANG to CBOR mapping and
converts YANG identifier strings to numeric identifiers for payload
size reduction. CORECONF extends the set of YANG based protocols,
NETCONF and RESTCONF, with the capability to manage constrained
devices and networks.
"Group Object Security for Constrained RESTful Environments (Group
OSCORE)", Marco Tiloca, Goeran Selander, Francesca Palombini, John
Mattsson, Rikard Hoeglund, 2024-09-26,
This document defines the security protocol Group Object Security for
Constrained RESTful Environments (Group OSCORE), providing end-to-end
security of CoAP messages exchanged between members of a group, e.g.,
sent over IP multicast. In particular, the described protocol
defines how OSCORE is used in a group communication setting to
provide source authentication for CoAP group requests, sent by a
client to multiple servers, and for protection of the corresponding
CoAP responses. Group OSCORE also defines a pairwise mode where each
member of the group can efficiently derive a symmetric pairwise key
with any other member of the group for pairwise OSCORE communication.
Group OSCORE can be used between endpoints communicating with CoAP or
CoAP-mappable HTTP.
"Constrained Resource Identifiers", Carsten Bormann, Henk Birkholz,
2024-07-24,
The Constrained Resource Identifier (CRI) is a complement to the
Uniform Resource Identifier (URI) that represents the URI components
in Concise Binary Object Representation (CBOR) instead of in a
sequence of characters. This simplifies parsing, comparison, and
reference resolution in environments with severe limitations on
processing power, code size, and memory size.
This RFC updates RFC 7595 to add a note on how the URI Schemes
registry RFC 7595 describes cooperates with the CRI Scheme Numbers
registry created by the present RFC.
// (This "cref" paragraph will be removed by the RFC editor:) The
// present revision â16 of this draft continues -15 by picking up
// more comments; it was made specifically for IETF 120. This
// revision still contains open issues and is intended to serve as a
// snapshot.
"Group Communication for the Constrained Application Protocol (CoAP)", Esko
Dijk, Chonggang Wang, Marco Tiloca, 2024-10-21,
This document specifies the use of the Constrained Application
Protocol (CoAP) for group communication, including the use of UDP/IP
multicast as the default underlying data transport. Both unsecured
and secured CoAP group communication are specified. Security is
achieved by use of the Group Object Security for Constrained RESTful
Environments (Group OSCORE) protocol. The target application area of
this specification is any group communication use cases that involve
resource-constrained devices or networks that support CoAP. This
document replaces and obsoletes RFC 7390, while it updates RFC 7252
and RFC 7641.
"Observe Notifications as CoAP Multicast Responses", Marco Tiloca, Rikard
Hoeglund, Christian Amsuess, Francesca Palombini, 2024-10-21,
The Constrained Application Protocol (CoAP) allows clients to
"observe" resources at a server, and receive notifications as unicast
responses upon changes of the resource state. In some use cases,
such as based on publish-subscribe, it would be convenient for the
server to send a single notification addressed to all the clients
observing a same target resource. This document updates RFC7252 and
RFC7641, and defines how a server sends observe notifications as
response messages over multicast, synchronizing all the observers of
a same resource on a same shared Token value. Besides, this document
defines how Group OSCORE can be used to protect multicast
notifications end-to-end between the server and the observer clients.
"Conditional Attributes for Constrained RESTful Environments", Bill
Silverajan, Michael Koster, Alan Soloway, 2024-10-17,
This specification defines Conditional Notification and Control
Attributes that work with CoAP Observe (RFC7641).
Editor note
The git repository for the draft is found at https://github.com/core-
wg/conditional-attributes/
"Key Update for OSCORE (KUDOS)", Rikard Hoeglund, Marco Tiloca, 2024-10-21,
This document defines Key Update for OSCORE (KUDOS), a lightweight
procedure that two CoAP endpoints can use to update their keying
material by establishing a new OSCORE Security Context. Accordingly,
it updates the use of the OSCORE flag bits in the CoAP OSCORE Option
as well as the protection of CoAP response messages with OSCORE, and
it deprecates the key update procedure specified in Appendix B.2 of
RFC 8613. Thus, this document updates RFC 8613. Also, this document
defines a procedure that two endpoints can use to update their OSCORE
identifiers, run either stand-alone or during a KUDOS execution.
"CoAP Transport Indication", Christian Amsuess, Martine Lenders,
2024-10-21,
The Constrained Application Protocol (CoAP, [RFC7252]) is available
over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
lacks a way to unify these addresses. This document provides
terminology and provisions based on Web Linking [RFC8288] and Service
Bindings (SVCB, [RFC9460]) to express alternative transports
available to a device, and to optimize exchanges using these.
"DNS over CoAP (DoC)", Martine Lenders, Christian Amsuess, Cenk Gundogan,
Thomas Schmidt, Matthias Waehlisch, 2024-10-21,
This document defines a protocol for sending DNS messages over the
Constrained Application Protocol (CoAP). These CoAP messages are
protected by DTLS-Secured CoAP (CoAPS) or Object Security for
Constrained RESTful Environments (OSCORE) to provide encrypted DNS
message exchange for constrained devices in the Internet of Things
(IoT).
"Key Usage Limits for OSCORE", Rikard Hoeglund, Marco Tiloca, 2024-07-08,
Object Security for Constrained RESTful Environments (OSCORE) uses
AEAD algorithms to ensure confidentiality and integrity of exchanged
messages. Due to known issues allowing forgery attacks against AEAD
algorithms, limits should be followed on the number of times a
specific key is used for encryption or decryption. Among other
reasons, approaching key usage limits requires updating the OSCORE
keying material before communications can securely continue. This
document defines how two OSCORE peers can follow these key usage
limits and what steps they should take to preserve the security of
their communications.
"Constrained Application Protocol (CoAP) Performance Measurement Option",
Giuseppe Fioccola, Tianran Zhou, Massimo Nilo, Fabio Bulgarella,
2024-10-03,
This document specifies a method for the Performance Measurement of
the Constrained Application Protocol (CoAP). A new CoAP option is
defined in order to enable network telemetry both end-to-end and hop-
by-hop. The endpoints cooperate by marking and, possibly, mirroring
information on the round-trip connection.
"OSCORE-capable Proxies", Marco Tiloca, Rikard Hoeglund, 2024-10-21,
Object Security for Constrained RESTful Environments (OSCORE) can be
used to protect CoAP messages end-to-end between two endpoints at the
application layer, also in the presence of intermediaries such as
proxies. This document defines how to use OSCORE for protecting CoAP
messages also between an origin application endpoint and an
intermediary, or between two intermediaries. Also, it defines rules
to escalate the protection of a CoAP option, in order to encrypt and
integrity-protect it whenever possible. Finally, it defines how to
secure a CoAP message by applying multiple, nested OSCORE
protections, e.g., both end-to-end between origin application
endpoints, and between an application endpoint and an intermediary or
between two intermediaries. Therefore, this document updates RFC
8613. Furthermore, this document updates RFC 8768, by explicitly
defining the processing with OSCORE for the CoAP option Hop-Limit.
The approach defined in this document can be seamlessly used with
Group OSCORE, for protecting CoAP messages when group communication
is used in the presence of intermediaries.
"Proxy Operations for CoAP Group Communication", Marco Tiloca, Esko Dijk,
2024-10-21,
This document specifies the operations performed by a proxy, when
using the Constrained Application Protocol (CoAP) in group
communication scenarios. Such a proxy processes a single request
sent by a client over unicast, and distributes the request to a group
of servers, e.g., over UDP/IP multicast as the defined default
transport protocol. Then, the proxy collects the individual
responses from those servers and relays those responses back to the
client, in a way that allows the client to distinguish the responses
and their origin servers through embedded addressing information.
This document updates RFC7252 with respect to caching of response
messages at proxies.
"Identifier Update for OSCORE", Rikard Hoeglund, Marco Tiloca, 2024-07-08,
Two peers that communicate with the CoAP protocol can use the Object
Security for Constrained RESTful Environments (OSCORE) protocol to
protect their message exchanges end-to-end. To this end, the two
peers share an OSCORE Security Context and a number of related
identifiers. In particular, each of the two peers stores a Sender ID
that identifies its own Sender Context within the Security Context,
and a Recipient ID that identifies the Recipient Context associated
with the other peer within the same Security Context. These
identifiers are sent in plaintext within OSCORE-protected messages.
Hence, they can be used to correlate messages exchanged between peers
and track those peers, with consequent privacy implications. This
document defines an OSCORE ID update procedure that two peers can use
to update their OSCORE identifiers. This procedure can be run stand-
alone or seamlessly integrated in an execution of the Key Update for
OSCORE (KUDOS) procedure.
"ALPN ID Specification for CoAP over DTLS", Martine Lenders, Christian
Amsuess, Thomas Schmidt, Matthias Waehlisch, 2024-09-05,
This document specifies an Application-Layer Protocol Negotiation
(ALPN) ID for transport-layer-secured CoAP services.
"Constrained Application Protocol (CoAP): Corrections and Clarifications",
Carsten Bormann, 2024-10-14,
RFC 7252 defines the Constrained Application Protocol (CoAP), along
with a number of additional specifications, including RFC 7641, RFC
7959, RFC 8132, and RFC 8323. RFC 6690 defines the link format that
is used in CoAP self-description documents.
Some parts of the specification may be unclear or even contain errors
that may lead to misinterpretations that may impair interoperability
between different implementations. The present document provides
corrections, additions, and clarifications to the RFCs cited; this
document thus updates these RFCs. In addition, other clarifications
related to the use of CoAP in other specifications, including RFC
7390 and RFC 8075, are also provided.
CBOR Object Signing and Encryption (cose)
-----------------------------------------
"CBOR Encoded X.509 Certificates (C509 Certificates)", John Mattsson,
Goeran Selander, Shahid Raza, Joel Hoglund, Martin Furuhed, 2024-07-08,
This document specifies a CBOR encoding of X.509 certificates. The
resulting certificates are called C509 Certificates. The CBOR
encoding supports a large subset of RFC 5280 and all certificates
compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
eUICC, and CA/Browser Forum Baseline Requirements profiles. When
used to re-encode DER encoded X.509 certificates, the CBOR encoding
can in many cases reduce the size of RFC 7925 profiled certificates
with over 50% while also significantly reducing memory and code size
compared to ASN.1. The CBOR encoded structure can alternatively be
signed directly ("natively signed"), which does not require re-
encoding for the signature to be verified. The document also
specifies C509 Certificate Signing Requests, C509 COSE headers, a
C509 TLS certificate type, and a C509 file format.
"Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and
Encryption (COSE)", Hannes Tschofenig, Orie Steele, Ajitomi, Daisuke,
Laurence Lundblade, 2024-07-12,
This specification defines hybrid public-key encryption (HPKE) for
use with CBOR Object Signing and Encryption (COSE). HPKE offers a
variant of public-key encryption of arbitrary-sized plaintexts for a
recipient public key.
HPKE works for any combination of an asymmetric key encapsulation
mechanism (KEM), key derivation function (KDF), and authenticated
encryption with additional data (AEAD) function. Authentication for
HPKE in COSE is provided by COSE-native security mechanisms or by one
of the authenticated variants of HPKE.
This document defines the use of the HPKE with COSE.
"ML-DSA for JOSE and COSE", Michael Prorock, Orie Steele, Rafael Misoczki,
Michael Osborne, Christine Cloostermans, 2024-10-20,
This document describes JSON Object Signing and Encryption (JOSE) and
CBOR Object Signing and Encryption (COSE) serializations for Module-
Lattice-Based Digital Signature Standard (ML-DSA), which was derived
from Dilithium, a Post-Quantum Cryptography (PQC) based digital
signature scheme.
This document does not define any new cryptography, only
seralizations of existing cryptographic systems described in
[FIPS-204].
Note to RFC Editor: This document should not proceed to AUTH48 until
NIST completes paramater tuning and selection as a part of the PQC
(https://csrc.nist.gov/projects/post-quantum-cryptography)
standardization process.
"SLH-DSA for JOSE and COSE", Michael Prorock, Orie Steele, Rafael Misoczki,
Michael Osborne, Christine Cloostermans, 2024-10-20,
This document describes JOSE and COSE serializations for SLH-DSA,
which was derived from SPHINCS+, a Post-Quantum Cryptography (PQC)
based digital signature scheme. This document does not define any
new cryptography, only seralizations of existing cryptographic
systems described in [FIPS-205]. Note to RFC Editor: This document
should not proceed to AUTH48 until NIST completes paramater tuning
and selection as a part of the PQC (https://csrc.nist.gov/projects/
post-quantum-cryptography) standardization process.
"CBOR Object Signing and Encryption (COSE) Key Thumbprint", Kohei Isobe,
Hannes Tschofenig, Orie Steele, 2024-09-06,
This specification defines a method for computing a hash value over a
CBOR Object Signing and Encryption (COSE) Key. It specifies which
fields within the COSE Key structure are included in the
cryptographic hash computation, the process for creating a canonical
representation of these fields, and how to hash the resulting byte
sequence. The resulting hash value, referred to as a "thumbprint,"
can be used to identify or select the corresponding key.
"COSE Receipts", Orie Steele, Henk Birkholz, Antoine Delignat-Lavaud,
Cedric Fournet, 2024-10-17,
COSE (CBOR Object Signing and Encryption) Receipts prove properties
of a verifiable data structure to a verifier. Verifiable data
structures and associated proof types enable security properties,
such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to
certificates, end to end encrypted messaging systems, and supply
chain security. This specification enables concise transparency
oriented systems, by building on CBOR (Concise Binary Object
Representation) and COSE. The extensibility of the approach is
demonstrated by providing CBOR encodings for RFC9162.
"COSE Header parameter for RFC 3161 Time-Stamp Tokens", Henk Birkholz,
Thomas Fossati, Maik Riechert, 2024-09-10,
This document defines a CBOR Signing And Encrypted (COSE) header
parameter for incorporating RFC 3161-based timestamping into COSE
message structures (COSE_Sign and COSE_Sign1). This enables the use
of established RFC 3161 timestamping infrastructure to prove the
creation time of a message.
Discussion Venues
This note is to be removed before publishing as an RFC.
Source for this draft and an issue tracker can be found at
https://github.com/ietf-scitt/draft-birkholz-cose-tsa-tst-header-
parameter.
"COSE Hash Envelope", Orie Steele, Steve Lasker, Henk Birkholz, 2024-10-16,
This document defines new COSE header parameters for signaling a
payload as an output of a hash function. This mechanism enables
faster validation as access to the original payload is not required
for signature validation. Additionally, hints of the detached
payload's content format and availability are defined providing
references to optional discovery mechanisms that can help to find
original payload content.
DANE Authentication for Network Clients Everywhere (dance)
----------------------------------------------------------
"TLS Client Authentication via DANE TLSA records", Shumon Huque, Viktor
Dukhovni, 2024-11-07,
The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
Transport Layer Security (TLS) server certificates or public keys in
the DNS. This document updates RFC 6698 and RFC 7671. It describes
how to additionally use the TLSA record to publish client
certificates or public keys, and also the rules and considerations
for using them with TLS.
"TLS Extension for DANE Client Identity", Shumon Huque, Viktor Dukhovni,
2024-11-07,
This document specifies a TLS and DTLS extension to convey a DNS-
Based Authentication of Named Entities (DANE) Client Identity to a
TLS or DTLS server. This is useful for applications that perform TLS
client authentication via DANE TLSA records.
"An Architecture for DNS-Bound Client and Sender Identities", Ash Wilson,
Shumon Huque, Olle Johansson, Michael Richardson, 2024-10-15,
This architecture document defines terminology, interaction, and
authentication patterns, related to the use of DANE DNS records for
TLS client and messaging peer identity, within the context of
existing object security and TLS-based protocols.
DNS Delegation (deleg)
----------------------
"Problem Statement and Requirements for an Improved DNS Delegation
Mechanism abbrev: DNS DELEG Requirements", tale, Edward Lewis, Jim Reid,
Tim Wicinski, 2024-10-12,
Authoritative control of parts of the Domain Name System namespace
are indicated with a special record type, the NS record, that can
only indicate the name of the server which a client resolver should
contact for more information. Any other features of that server must
then be discovered through other mechanisms. This draft considers
the limitations of the current system, benefits that could be gained
by changing it, and what requirements constrain an updated design.
Deterministic Networking (detnet)
---------------------------------
"Reliable and Available Wireless Technologies", Pascal Thubert, Dave
Cavalcanti, Xavier Vilajosana, Corinna Schmitt, Janos Farkas, 2024-10-19,
This document browses the short and middle range radio technologies
that are suitable to provide a DetNet/RAW service over, presents the
characteristics that RAW may leverage, and explores the applicability
of the technologies to carry deterministic flows, as of its time of
publication. The studied technologies are Wi-Fi 6/7, TimeSlotted
Channel Hopping (TSCH), 3GPP 5G, and L-band Digital Aeronautical
Communications System (LDACS). Those technologies were selected as
part of the WG formation and listed in the WG charter.
"Deterministic Networking (DetNet) Controller Plane Framework", Andrew
Malis, Xuesong Geng, Mach Chen, Balazs Varga, Carlos Bernardos, 2024-07-05,
This document provides a framework overview for the Deterministic
Networking (DetNet) controller plane. It discusses concepts and
requirements for DetNet controller plane which could be basis for
future solution specification.
"Reliable and Available Wireless Architecture", Pascal Thubert, 2024-11-14,
Reliable and Available Wireless (RAW) improves the reliability and
availability in DetNet networks composed of any combination of wired
and wireless segments. The RAW Architecture leverages and extends
RFC 8655, the Deterministic Networking Architecture, to adapt to
challenges that affect prominently the wireless medium, in particular
intermittent transmission loss. This document defines a network
control loop that optimizes the use of constrained bandwidth and
energy while assuring the expected connectivity services. The loop
involves a new Point of Local Repair function in the DetNet service
sublayer that dynamically selects the DetNet path(s) for the future
packets to route around local connectivity degradation.
"Requirements for Scaling Deterministic Networks", Peng Liu, Yizhou Li,
Toerless Eckert, Quan Xiong, Jeong-dong Ryoo, zhushiyin, Xuesong Geng,
2024-11-20,
Aiming at scaling deterministic networks, this document describes the
technical and operational requirements when the network has large
variation in latency among hops, a great number of flows and/or
multiple domains without the same time source. Different
deterministic levels of applications co-exist and are transported in
such a network. This document also describes the corresponding
Deterministic Networking (DetNet) data plane enhancement
requirements.
"Requirements for Reliable Wireless Industrial Services", Rute Sofia, Paulo
Mendes, Carlos Bernardos, Eve Schooler, 2024-07-08,
This document provides an overview of the communication requirements
for handling reliable wireless services in the context of industrial
environments. The aim of the draft is to raise awareness of the
communication requirements of current and future wireless industrial
services; how they can coexist with wired infrastructures; the key
drivers for reliable wireless integration; the relevant communication
requirements to be considered; the current and future challenges
arising from the use of wireless services; and the potential benefits
of wireless communication.
"Dataplane Enhancement Taxonomy", Jinoo Joung, Xuesong Geng, Shaofu Peng,
Toerless Eckert, 2024-10-20,
This draft is to facilitate the understanding of the data plane
enhancement solutions, which are suggested currently or can be
suggested in the future, for deterministic networking. This draft
provides criteria for classifying data plane solutions. Examples of
each category are listed, along with reasons where necessary.
Strengths and limitations of the categories are described.
Suitability of the solutions for various services of deterministic
networking are also briefly mentioned. Reference topologies for
evaluation of the solutions are given as well.
Dynamic Host Configuration (dhc)
--------------------------------
"Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", Tomek Mrugalski,
Bernie Volz, Michael Richardson, Sheng Jiang, Timothy Winters, 2024-10-21,
This document describes the Dynamic Host Configuration Protocol for
IPv6 (DHCPv6): an extensible mechanism for configuring nodes with
network configuration parameters, IP addresses, and prefixes.
Parameters can be provided statelessly, or in combination with
stateful assignment of one or more IPv6 addresses and/or IPv6
prefixes. DHCPv6 can operate either in place of or in addition to
stateless address autoconfiguration (SLAAC).
This document replaces RFC8415 to incorporate reported errata and to
obsolete the assignment of temporary addresses (the IA_TA option) and
the server unicast capability (the Server Unicast option and
UseMulticast status code).
"Registering Self-generated IPv6 Addresses using DHCPv6", Warren Kumari,
Suresh Krishnan, Rajiv Asati, Lorenzo Colitti, Jen Linkova, Sheng Jiang,
2024-05-16,
This document defines a method to inform a DHCPv6 server that a
device has one or more self-generated or statically configured
addresses.
Domain-based Message Authentication, Reporting & Conformance (dmarc)
--------------------------------------------------------------------
"Domain-based Message Authentication, Reporting, and Conformance (DMARC)",
Todd Herr, John Levine, 2024-11-20,
This document describes the Domain-based Message Authentication,
Reporting, and Conformance (DMARC) protocol.
DMARC permits the owner of an email's Author Domain (#author-domain)
to enable validation of the domain's use, to indicate the Domain
Owner's (#domain-owner) or Public Suffix Operator's (#public-suffix-
operator) message handling preference regarding failed validation,
and to request reports about the use of the domain name. Mail
receiving organizations can use this information when evaluating
handling choices for incoming mail.
This document obsoletes RFCs 7489 and 9091.
"Domain-based Message Authentication, Reporting, and Conformance (DMARC)
Failure Reporting", Steven Jones, Alessandro Vesely, 2024-09-10,
Domain-based Message Authentication, Reporting, and Conformance
(DMARC) is a scalable mechanism by which a domain owner can request
feedback about email messages using their domain in the From: address
field. This document describes "failure reports," or "failed message
reports", which provide details about individual messages that failed
to authenticate according to the DMARC mechanism.
"Domain-based Message Authentication, Reporting, and Conformance (DMARC)
Aggregate Reporting", Alex Brotman, 2024-11-22,
Domain-based Message Authentication, Reporting, and Conformance
(DMARC) allows for Domain Owners to request aggregate reports from
receivers. This report is an XML document, and contains extensible
elements that allow for other types of data to be specified later.
The aggregate reports can be submitted to the Domain Owner's
specified destination as supported by the receiver.
Distributed Mobility Management (dmm)
-------------------------------------
"Mobility-aware Transport Network Slicing for 5G", Uma Chunduri, John
Kaippallimalil, Sridhar Bhaskaran, Jeff Tantsura, Luis Contreras,
2024-11-15,
Network slicing in 5G enables logical networks for communication
services of multiple 5G customers to be multiplexed over the same
infrastructure. While 5G slicing covers logical separation of
various aspects of 5G infrastructure and services, user's data plane
packets over the Radio Access Network (RAN) and Core Network (5GC)
use IP in many segments of an end-to-end 5G slice. When end-to-end
slices in a 5G System use network resources, they are mapped to
corresponding IP transport network slice(s) which in turn provide the
bandwidth, latency, isolation, and other criteria required for the
realization of a 5G slice.
This document describes mapping of 5G slices to transport network
slices using UDP source port number of the GTP-U bearer when the IP
transport network (slice provider) is separated by an "attachment
circuit" from the networks in which the 5G network functions are
deployed, for example, 5G functions that are distributed across data
centers. The slice mapping defined here is supported transparently
when a 5G user device moves across 5G attachment points and session
anchors.
Domain Name System Operations (dnsop)
-------------------------------------
"IP Fragmentation Avoidance in DNS over UDP", Kazunori Fujiwara, Paul
Vixie, 2024-09-26,
The widely deployed EDNS0 feature in the DNS enables a DNS receiver
to indicate its received UDP message size capacity, which supports
the sending of large UDP responses by a DNS server. Large DNS/UDP
messages are more likely to be fragmented and IP fragmentation has
exposed weaknesses in application protocols. It is possible to avoid
IP fragmentation in DNS by limiting the response size where possible,
and signaling the need to upgrade from UDP to TCP transport where
necessary. This document describes techniques to avoid IP
fragmentation in DNS.
"Delegation Revalidation by DNS Resolvers", Shumon Huque, Paul Vixie,
Willem Toorop, 2024-07-08,
This document recommends improved DNS [RFC1034] [RFC1035] resolver
behavior with respect to the processing of Name Server (NS) resource
record (RR) sets (RRsets) during iterative resolution. When
following a referral response from an authoritative server to a child
zone, DNS resolvers should explicitly query the authoritative NS
RRset at the apex of the child zone and cache this in preference to
the NS RRset on the parent side of the zone cut. The (A and AAAA)
address RRsets in the additional section from referral responses and
authoritative NS answers for the names of the NS RRset, should
similarly be re-queried and used to replace the entries with the
lower trustworthiness ranking in cache. Resolvers should also
periodically revalidate the child delegation by re-querying the
parent zone at the expiration of the TTL of the parent side NS RRset.
"DNSSEC automation", Ulrich Wisser, Shumon Huque, Johan Stenstam,
2024-10-19,
This document describes an algorithm and protocol to automate the
setup, operations, and decomissioning of Multi-Signer DNSSEC
[RFC8901] configurations. It employs Model 2 of the multi-signer
specification, where each operator has their own distinct KSK and ZSK
sets (or CSK sets), Managing DS Records from the Parent via CDS/
CDNSKEY [RFC8078], and Child-to-Parent Synchronization in DNS
[RFC7477] to accomplish this.
"Domain Control Validation using DNS", Shivan Sahib, Shumon Huque, Paul
Wouters, Erik Nygren, 2024-10-21,
Many application services on the Internet need to verify ownership or
control of a domain in the Domain Name System (DNS). The general
term for this process is "Domain Control Validation", and can be done
using a variety of methods such as email, HTTP/HTTPS, or the DNS
itself. This document focuses only on DNS-based methods, which
typically involve the Application Service Provider requesting a DNS
record with a specific format and content to be visible in the domain
to be verified. There is wide variation in the details of these
methods today. This document provides some best practices to avoid
known problems.
"Using DNSSEC Authentication of Named Entities (DANE) with DNS Service
Bindings (SVCB) and QUIC", Benjamin Schwartz, Robert Evans, 2024-07-22,
Service Binding (SVCB) records introduce a new form of name
indirection in DNS. They also convey information about the
endpoint's supported protocols, such as whether QUIC transport is
available. This document specifies how DNS-Based Authentication of
Named Entities (DANE) interacts with Service Bindings to secure
connections, including use of port numbers and transport protocols
discovered via SVCB queries. The "_quic" transport name label is
introduced to distinguish TLSA records for DTLS and QUIC.
"Structured Error Data for Filtered DNS", Dan Wing, Tirumaleswar Reddy.K,
Neil Cook, Mohamed Boucadair, 2024-11-26,
DNS filtering is widely deployed for various reasons, including
network security. However, filtered DNS responses lack structured
information for end users to understand the reason for the filtering.
Existing mechanisms to provide explanatory details to end users cause
harm especially if the blocked DNS response is for HTTPS resources.
This document updates RFC 8914 by signaling client support for
structuring the EXTRA-TEXT field of the Extended DNS Error to provide
details on the DNS filtering. Such details can be parsed by the
client and displayed, logged, or used for other purposes.
"Compact Denial of Existence in DNSSEC", Shumon Huque, Christian Elmerot,
Olafur Gudmundsson, 2024-10-17,
This document describes a technique to generate a signed DNS response
on demand for a non-existent name by claiming that the name exists
but doesn't have any data for the queried record type. Such answers
require only one minimal NSEC record, allow online signing servers to
minimize signing operations and response sizes, and prevent zone
content disclosure.
This document updates RFC 4034 and 4035.
"Initializing a DNS Resolver with Priming Queries", Peter Koch, Matt
Larson, Paul Hoffman, 2024-08-27,
This document describes the queries that a DNS resolver should emit
to initialize its cache. The result is that the resolver gets both a
current NS resource record set (RRset) for the root zone and the
necessary address information for reaching the root servers.
This document, when published, obsoletes RFC 8109. See Appendix A
for the list of changes from RFC 8109.
"Clarifications on CDS/CDNSKEY and CSYNC Consistency", Peter Thomassen,
2024-09-18,
Maintenance of DNS delegations requires occasional changes of the DS
and NS record sets on the parent side of the delegation. For the
case of DS records, RFC 7344 provides automation by allowing the
child to publish CDS and/or CDNSKEY records holding the prospective
DS parameters which the parent can ingest. Similarly, RFC 7477
specifies CSYNC records to indicate a desired update of the
delegation's NS (and glue) records. Parent-side entities (e.g.
Registries, Registrars) can query these records from the child and,
after validation, use them to update the parent-side RRsets of the
delegation.
This document specifies that when performing such queries, parent-
side entities MUST ensure that updates triggered via CDS/CDNSKEY and
CSYNC records are consistent across the child's authoritative
nameservers, before taking any action based on these records.
"Generalized DNS Notifications", Johan Stenstam, Peter Thomassen, John
Levine, 2024-10-21,
This document extends the use of DNS NOTIFY [RFC1996] beyond
conventional zone transfer hints, bringing the benefits of ad-hoc
notifications to DNS delegation maintenance in general. Use cases
include DNSSEC bootstrapping and key rollovers hints, and quicker
changes to a delegation's NS record set.
To enable this functionality, a method for discovering the receiver
endpoint for such notification message is introduced, via the new
DSYNC record type.
TO BE REMOVED: This document is being collaborated on in Github at:
https://github.com/peterthomassen/draft-ietf-dnsop-generalized-notify
(https://github.com/peterthomassen/draft-ietf-dnsop-generalized-
notify). The most recent working version of the document, open
issues, etc. should all be available there. The authors (gratefully)
accept pull requests.
"DNSSEC Trust Anchor Publication for the Root Zone", Joe Abley, Jakob
Schlyter, Guillaume Bailey, Paul Hoffman, 2024-09-04,
The root zone of the global Domain Name System (DNS) is
cryptographically signed using DNS Security Extensions (DNSSEC).
In order to obtain secure answers from the root zone of the DNS using
DNSSEC, a client must configure a suitable trust anchor. This
document describes the format and publication mechanisms IANA uses to
distribute the DNSSEC trust anchors.
This document obsoletes RFC 7958.
"Remove deprecated GOST algorithms from active use within DNSSEC", Wes
Hardaker, Warren Kumari, 2024-10-03,
This document retires the use of ECC-GOST within DNSSEC.
"DNSSEC Cryptographic Algorithm Recommendation Update Process", Wes
Hardaker, Warren Kumari, 2024-10-18,
The DNSSEC protocol makes use of various cryptographic algorithms to
provide authentication of DNS data and proof of non-existence. To
ensure interoperability between DNS resolvers and DNS authoritative
servers, it is necessary to specify both a set of algorithm
implementation requirements and usage guidelines to ensure that there
is at least one algorithm that all implementations support. This
document updates [RFC8624] by moving the canonical source of
algorithm implementation requirements and usage guidance for DNSSEC
from [RFC8624] to an IANA registry. Future extensions to this
registry can be made under new, incremental update RFCs.
"Remove SHA-1 from active use within DNSSEC", Wes Hardaker, Warren Kumari,
2024-10-03,
This document retires the use of SHA-1 within DNSSEC.
"Greasing Protocol Extension Points in the DNS", Shumon Huque, Mark
Andrews, 2024-10-17,
Long term evolvability of the Domain Name System (DNS) protocol
requires the ability to support change. Greasing is one technique
that exercises the regular use of unallocated protocol extension
points to prevent ossification of their current usage patterns by
middleboxes or DNS implementations. This document describes
considerations and proposals for applying grease to the DNS protocol.
Discussion Venues
This note is to be removed before publishing as an RFC.
Source for this draft and an issue tracker can be found at
https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-grease.
Extensions for Scalable DNS Service Discovery (dnssd)
-----------------------------------------------------
"Service Registration Protocol for DNS-Based Service Discovery", Ted Lemon,
Stuart Cheshire, 2024-03-04,
The Service Registration Protocol for DNS-Based Service Discovery
uses the standard DNS Update mechanism to enable DNS-Based Service
Discovery using only unicast packets. This makes it possible to
deploy DNS Service Discovery without multicast, which greatly
improves scalability and improves performance on networks where
multicast service is not an optimal choice, particularly IEEE 802.11
(Wi-Fi) and IEEE 802.15.4 networks. DNS-SD Service registration uses
public keys and SIG(0) to allow services to defend their
registrations.
"An EDNS(0) option to negotiate Leases on DNS Updates", Stuart Cheshire,
Ted Lemon, 2023-07-07,
This document describes an EDNS(0) option that can be used by DNS
Update requestors and DNS servers to include a lease lifetime in a
DNS Update or response, allowing a server to garbage collect stale
resource records that have been added by DNS Updates
"DNS Multiple QTYPEs", Ray Bellis, 2024-11-07,
This document specifies a method for a DNS client to request
additional DNS record types to be delivered alongside the primary
record type specified in the question section of a DNS query
(OpCode=0).
Drone Remote ID Protocol (drip)
-------------------------------
"DRIP Entity Tags (DET) in the Domain Name System (DNS)", Adam
Wiethuechter, Jim Reid, 2024-11-15,
This document describes the discovery and management of DRIP Entity
Tags (DETs) in DNS. Authoritative Name Servers, with DRIP specific
DNS structures and standard DNS methods, are the Public Information
Registries for DETs and their related metadata.
"The DRIP DET public Key Infrastructure", Robert Moskowitz, Stuart Card,
2024-11-15,
The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
specific variant of classic Public Key Infrastructures (PKI) where
the organization is around the DET, in place of X.520 Distinguished
Names. Further, the DKI uses DRIP Endorsements in place of X.509
certificates for establishing trust within the DKI.
There are two X.509 profiles for shadow PKI behind the DKI, with many
of their X.509 fields mirroring content in the DRIP Endorsements.
This PKI can at times be used where X.509 is expected and non-
constrained communication links are available that can handle their
larger size.
C509 (CBOR) encoding of all X.509 certificates are also provided as
an alternative for where there are gains in reduced object size.
Delay/Disruption Tolerant Networking (dtn)
------------------------------------------
"Bundle-in-Bundle Encapsulation", Scott Burleigh, Alberto Montilla, Joshua
Deaton, 2024-07-23,
This document describes Bundle-in-Bundle Encapsulation (BIBE), a
Delay-Tolerant Networking (DTN) Bundle Protocol (BP) "convergence
layer" protocol that tunnels BP "bundles" through encapsulating
bundles. The services provided by the BIBE convergence-layer
protocol adapter encapsulate an outbound BP "bundle" in a BIBE
convergence-layer protocol data unit for transmission as the payload
of a bundle. Security measures applied to the encapsulating bundle
may augment those applied to the encapsulated bundle. The protocol
includes a mechanism for recovery from loss of an encapsulating
bundle, called "custody transfer". This mechanism is adapted from
the custody transfer procedures described in the experimental Bundle
Protocol specification developed by the Delay-Tolerant Networking
Research Group of the Internet Research Task Force and documented in
RFC 5050.
"Update to the ipn URI scheme", Rick Taylor, Edward Birrane, 2024-09-27,
This document updates the specification of the ipn URI scheme
previously defined in RFC 6260, the IANA registries established in
RFC 7116, and the rules for the encoding and decoding of these URIs
when used as an Endpoint Identifier (EID) in Bundle Protocol Version
7 (BPv7) as defined in RFC 9171. These updates clarify the structure
and behavior of the ipn URI scheme, define new encodings of ipn
scheme URIs, and establish the registries necessary to manage this
scheme.
"Bundle Protocol Version 7 Administrative Record Types Registry", Brian
Sipos, 2024-10-03,
This document updates RFC 9171 to clarify that a Bundle Protocol
Version 7 agent is intended to use an IANA registry for
Administrative Record types. It also makes a code point reservations
for private and experimental use.
"DTN Bundle Protocol Security (BPSec) COSE Context", Brian Sipos,
2024-11-21,
This document defines a security context suitable for using CBOR
Object Signing and Encryption (COSE) algorithms within Bundle
Protocol Security (BPSec) integrity and confidentiality blocks. A
profile for COSE, focused on asymmetric-keyed algorithms, and for
PKIX certificates are also defined for BPSec interoperation.
"DTNMA Application Resource Identifier (ARI)", Edward Birrane, Emery Annis,
Brian Sipos, 2024-07-21,
This document defines the structure, format, and features of the
naming scheme for the objects defined in the Delay-Tolerant
Networking Management Architecture (DTNMA) Application Management
Model (AMM), in support of challenged network management solutions
described in the DTNMA document.
This document defines the DTNMA Application Resource Identifier
(ARI), using a text-form based on the common Uniform Resource
Identifier (URI) and a binary-form based on Concise Binary Object
Representation (CBOR). These meet the needs for a concise, typed,
parameterized, and hierarchically organized set of managed data
elements.
"DTNMA Application Management Model (AMM) and Data Models", Edward Birrane,
Brian Sipos, Justin Ethier, 2024-07-21,
This document defines a data model that captures the information
necessary to asynchronously manage applications within the Delay-
Tolerant Networking Management Architecture (DTNMA). This model
provides a set of common type definitions, data structures, and a
template for publishing standardized representations of model
elements.
"DTNMA Application Data Model (ADM) YANG Syntax", Edward Birrane, Brian
Sipos, Justin Ethier, 2024-07-21,
This document defines a concrete syntax for encoding a Delay-Tolerant
Networking Management Architecture (DTNMA) Application Data Model
(ADM) using the syntax, but not the full data model, of YANG.
Extensions to YANG are defined to capture the specifics needed to
define DTNMA Application Management Model (AMM) objects and to use
the Application Resource Identifier (ARI) data-value syntax.
"DTNMA Asynchronous Management Protocol (AMP)", Edward Birrane, Brian
Sipos, 2024-11-06,
This document defines a messaging protocol for the Delay-Tolerant
Networking (DTN) Management Architecture (DTNMA) Asynchronous
Management Model (AMM) and a transport mapping for exchanging those
messages over a network. This Asynchronous Management Protocol (AMP)
does not require transport-layer sessions, operates over
unidirectional links, and seeks to reduce the energy and compute
power necessary for performing network management of resource
constrained devices and over challenged networks.
"Bundle Protocol Endpoint ID Patterns", Brian Sipos, 2024-11-07,
This document extends the Bundle Protocol Endpoint ID (EID) concept
into an EID Pattern, which is used to categorize any EID as matching
a specific pattern or not. EID Patterns are suitable for expressing
configuration, for being used on-the-wire by protocols, and for being
easily understandable by a layperson. EID Patterns include scheme-
specific optimizations for expressing set membership and each scheme
pattern includes text and binary encoding forms; the pattern for the
"ipn" EID scheme being designed to be highly compressible in its
binary form. This document also defines a Public Key Infrastructure
Using X.509 (PKIX) Other Name form to contain an EID Pattern and a
handling rule to use a pattern to match an EID.
"Delay-Tolerant Networking UDP Convergence Layer Protocol Version 2", Brian
Sipos, Joshua Deaton, 2024-11-07,
This document describes a UDP convergence layer (UDPCL) for Delay-
Tolerant Networking (DTN). This version of the UDPCL protocol
clarifies requirements of RFC7122, adds discussion of multicast
addressing, congestion signaling, and updates to the Bundle Protocol
(BP) contents, encodings, and convergence layer requirements in BP
version 7. Specifically, the UDPCL uses CBOR-encoded BPv7 bundles as
its service data unit being transported and provides an unreliable
transport of such bundles. This version of UDPCL also includes
security and extensibility mechanisms.
Detecting Unwanted Location Trackers (dult)
-------------------------------------------
"DULT Threat Model", Maggie Delano, Jessica Lowell, 2024-09-18,
Lightweight location tracking tags are in wide use to allow users to
locate items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network users
(e.g., phones) report which tags they see and their location, thus
allowing the owner of the tag to determine where their tag was most
recently seen. While there are many legitimate uses of these tags,
they are also susceptible to misuse for the purpose of stalking and
abuse. A protocol that allows others to detect unwanted location
trackers must incorporate an understanding of the unwanted tracking
landscape today. This document provides a threat analysis for this
purpose, will define what is in and out of scope for the unwanted
location tracking protocols, and will provide some design
considerations for implementation of protocols to detect unwanted
location tracking.
"Finding Tracking Tags", Christine Fossaceca, Eric Rescorla, 2024-11-03,
Lightweight location tracking tags are in wide use to allow users to
locate items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network users
(e.g., phones) report which tags they see and their location, thus
allowing the owner of the tag to determine where their tag was most
recently seen. This document defines the protocol by which devices
report tags they have seen and by which owners look up their
location.
"Detecting Unwanted Location Trackers Accessory Protocol", Brent Ledvina,
David Lazarov, Ben Detwiler, Siddika Polatkan, 2024-11-03,
This document lists a set of best practices and protocols for
accessory manufacturers whose products have built-in location-
tracking capabilities. By following these requirements and
recommendations, a location-tracking accessory will be compatible
with unwanted tracking detection and alerts on mobile platforms.
This is an important capability for improving the privacy and safety
of individuals in the circumstance that those accessories are used to
track their location without their knowledge or consent.
Emergency Context Resolution with Internet Technologies (ecrit)
---------------------------------------------------------------
"A LoST extension to return complete and similar location info", Brian
Rosen, Roger Marshall, Jeff Martin, 2022-03-04,
This document describes an extension to the LoST protocol of RFC 5222
that allows additional civic location information to be returned in a
. This extension supports two use cases: First,
when the input location is valid but lacks some Civic Address
elements, the LoST server can provide a completed form. Second, when
the input location is invalid, the LoST server can identify one or
more feasible ("similar") locations. This extension is applicable
when the location information in the request uses the
Basic Civic profile as described in RFC 5222 or another profile whose
definition provides instructions concerning its use with this
extension.
"Validation of Locations Around a Planned Change", Brian Rosen, 2024-11-19,
This document defines an extension to the Location to Service
Translation (LoST) protocol (RFC5222) that allows a LoST server to
notify a client of planned changes to location data. This extension
is only useful with the validation function of LoST. It is
beneficial for LoST validation clients to be aware of planned
changes, since at a known future date, previously valid records may
become invalid, and new records may become valid. This extension
adds an element to the request to allow a LoST client
to request validation as of a specified date. It adds an optional
Time-To-Live element to the response, which informs clients of the
current expected lifetime of a validation. It also adds a separate
interface to a LoST server that allows a client to poll for planned
changes. Additionally, this document provides a conventional XML
schema for LoST, as a backwards compatible alternative to the RelaxNG
schema in RFC5222.
"Emergency Registries", Brian Rosen, Brandon Abley, 2024-10-18,
Multiple emergency services standards organizations are developing
specifications based on IETF emergency calling and other IETF
protocols. There is a desire among these organizations to use common
registries, not tied to a particular country or national Standards
Development Organization (SDO), in the long term pursuit of a single
worldwide standard. This document asks IANA to create a set of
registries and provides processes for expanding the set and
populating them.
Revision of core Email specifications (emailcore)
-------------------------------------------------
"Simple Mail Transfer Protocol", John Klensin, 2024-11-11,