Internet DRAFT - draft-ietf-v6ops-hbh

draft-ietf-v6ops-hbh







Network Working Group                                            S. Peng
Internet-Draft                                                     Z. Li
Intended status: Informational                       Huawei Technologies
Expires: 20 August 2024                                           C. Xie
                                                           China Telecom
                                                                  Z. Qin
                                                            China Unicom
                                                               G. Mishra
                                                            Verizon Inc.
                                                        17 February 2024


  Operational Issues with Processing of the Hop-by-Hop Options Header
                        draft-ietf-v6ops-hbh-10

Abstract

   This document describes the processing of the Hop-by-Hop Options
   Header (HBH) in current routers in the aspects of standards
   specification, common implementations, and default operations.  This
   document outlines reasons why the Hop-by-Hop Options Header is rarely
   utilized in current networks.  In addition, this document describes
   how HBH Options Header could be used as a powerful mechanism allowing
   deployment and operations of new services requiring a more optimized
   way to leverage network resources of an infrastructure.  The purpose
   of this draft is to document reasons why HBH Options Header is rarely
   used within networks.  It motivates the benefits and requirements
   needed to enable wider use of HBH Options.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] [RFC8174]
   when, and only when, they appear in all capitals, as shown here.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.






Peng, et al.             Expires 20 August 2024                 [Page 1]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 20 August 2024.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3.  New Services  . . . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Modern Router Architecture  . . . . . . . . . . . . . . . . .   5
   5.  Specification of RFC 8200 . . . . . . . . . . . . . . . . . .   6
   6.  Common Implementations  . . . . . . . . . . . . . . . . . . .   7
   7.  Typical Processing  . . . . . . . . . . . . . . . . . . . . .   8
   8.  Design Principles . . . . . . . . . . . . . . . . . . . . . .   8
   9.  Migration Strategies  . . . . . . . . . . . . . . . . . . . .   9
   10. Security Considerations . . . . . . . . . . . . . . . . . . .   9
   11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   12. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   9
   13. References  . . . . . . . . . . . . . . . . . . . . . . . . .  10
     13.1.  Normative References . . . . . . . . . . . . . . . . . .  10
     13.2.  Informative References . . . . . . . . . . . . . . . . .  11
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   When IPv6 was first implemented on high-speed routers, Hop-by-Hop
   Options header (HBH) options were not yet well-understood and ASICs
   were not as capable as they are today.  Due to these historical
   reasons, as well as limited IPv6 deployments and few service
   requirements, the early common IPv6 implementation was that the node
   sends the IPv6 packets with the HBH Options Header to the control



Peng, et al.             Expires 20 August 2024                 [Page 2]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   plane of the node [RFC9098].  The option type of each option carried
   within the HBH Options Header is not even examined before the packet
   is sent to the control plane [RFC7045].  Such processing behavior is
   often the default configuration or, even worse, is the only behavior
   of the IPv6 implementation of the node.

   Sending the HBH Options Header to the control plane for processing
   could result in Denial of Service (DoS) attack on the router control
   plane [RFC9288] and inconsistent packet drops.  This is due to rate-
   limiting on the interface between the router control plane and
   forwarding plane, which impacts packet forwarding.  This has in turn
   led to configuration of measures (such as infrastructure Access
   Control Lists (ACLs)) to mitigate this DoS vector.

   This actually introduced a circular problem:

   -> Implementations that send packets to the control plane for
   processing are at risk for Denial of Service attack.

   -> To mitigate the risk of DoS attack, many network operators
   configured their nodes to discard all packets containing HBH Options
   Header.

   -> Because of network operators' configurations that discard packets
   containing HBH Options Header, protocol designers stopped defining
   new HBH Options.

   -> Because protocol designers stopped defining new HBH Options, the
   community was not motivated to change the conventional implementation
   that caused use of a HBH Option Header to become a DoS vector.

   Driven by the wide deployments of IPv6 and ever-emerging new services
   in recent years, the HBH Options Header is a valuable container for
   carrying the information to facilitate these new services.

   The purpose of this work is to:

   *  Break the endless cycle that resulted in HBH being a DOS vector.

   *  Enable the HBH options header to be utilized in a safe and secure
      way without impacting the control plane.

   *  Ease the deployments of the new network services that utilize the
      HBH Option Header in a multi-vendor scenario that can now be
      deployed without operational impact.






Peng, et al.             Expires 20 August 2024                 [Page 3]

Internet-Draft           Processing HBH Opt Hdr            February 2024


2.  Terminology

   The terms Forwarding Plane and Control Plane used in this draft refer
   to the terminologies as defined in [I-D.ietf-6man-hbh-processing].

3.  New Services

   As IPv6 is being rapidly and widely deployed worldwide, more and more
   applications and network services are migrating to or directly
   adopting IPv6.  New services that require hop-by-hop processing are
   emerging and the HBH Options header is going to be utilized by the
   new services in various scenarios.

   In-situ OAM (IOAM) with IPv6 encapsulation [RFC9486] is used to
   enhance diagnostics of IPv6 networks and complements other
   mechanisms, such as the IPv6 Performance and Diagnostic Metrics
   Destination Option described in [RFC8250].  The IOAM data fields are
   encapsulated in "option data" fields of the Hop-by-Hop Options
   header.

   The Alternate Marking Option is defined as a new IPv6 Hop-by-Hop
   option to encode an alternate marking technique [RFC9343].

   The Minimum Path MTU Hop-by-Hop Option is defined in [RFC9268] to
   record the minimum Path MTU along the forward path between a source
   host to a destination host.  This Hop-by-Hop option is intended to be
   used in environments like Data Centers and on paths between Data
   Centers as well as other environments including the general Internet.
   It provides a useful tool to better take advantage of paths capable
   of supporting a large Path MTU.

   A Virtual Transport Network (VTN) Option is used to carry the VTN
   related information, which could used to identify the set of network
   resources allocated to a VTN and the rules for packet processing.
   [I-D.ietf-6man-enhanced-vpn-vtn-id].

   As more services start utilizing the HBH Options header, more packets
   containing HBH Options are going to be injected into the networks.  A
   currently common configuration in deployed networks is for routers to
   send all the packets of the new services to the control plane of the
   nodes, with the possible consequence of resulting in a DoS
   vulnerability on the control plane.  The packets will be dropped and
   the normal IP forwarding is severely impacted.  The deployment of new
   network services involving multi-vendor interoperability is greatly
   impeded.






Peng, et al.             Expires 20 August 2024                 [Page 4]

Internet-Draft           Processing HBH Opt Hdr            February 2024


4.  Modern Router Architecture

   The architecture of modern routers deployed by Internet operators
   maintains a strict separation of the router control plane and its
   forwarding plane [RFC6192], as shown in Figure 1.  Either the control
   plane or the forwarding plane is composed of both software and
   hardware, but each plane is responsible for different functions.  In
   this document, we focus on only hardware routers following the
   architecture as shown in Figure 1 which are typical of core routers
   or datacenter routers, as opposed to software-based routers such as
   home routers or hotspot routers in a smartphone.

                             +----------------+
                             | Router Control |
                             |     Plane      |
                             +------+-+-------+
                                    | |
                                 Interface Z
                                    | |
                             +------+-+-------+
                             |   Forwarding   |
               Interface X ==[     Plane      ]== Interface Y
                             +----------------+

Figure 1. IP router architecture splitting the control and forwarding planes

   Many of the packet-processing devices employed in current router
   designs are fixed-function ASICs that handle common functions,
   however there is a trend towards programmable device datapaths such
   as P4 [P4].  While these devices can be very efficient for the set of
   functions they are designed for, they can be very inflexible.  There
   is a tradeoff of price, performance and flexibility when vendors make
   a choice to use a fixed function ASIC as opposed to Network
   Processing Unit (NPU).  Due to the inflexibility of the fixed
   function ASIC, tasks that require additional processing such as IPv6
   HBH header processing must be punted to the control plane.

   This problem is still a challenge today and is the reason why
   operators drop or ignore HBH options to protect against control plane
   DOS attack.  Semiconductor chip technology has advanced significantly
   in the last decade.  An industry trend is for intelligent multi-core
   CPU hardware using modern NPUs for forwarding packets at line rate
   while still being able to perform other complex tasks such as HBH
   forwarding options processing without having to punt to the control
   plane increasing the viability of ubiquitous HBH use cases.






Peng, et al.             Expires 20 August 2024                 [Page 5]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   Parsing buffers with a limited size are commonly used in router
   implementations.  The parsing buffer contains the headers of a packet
   that can be processed in the fast path and typically have sizes like
   128, 256, 284 bytes.  A source node is permitted to encode hundreds
   of options in 2,048 bytes [I-D.ietf-6man-eh-limits].  With today's
   technology it would be cost prohibitive to be able to process
   hundreds of options with either NPU or proprietary fixed function
   ASIC [I-D.ietf-6man-eh-limits].

   IPv6 Extended Header limitations that need to be addressed to make
   HBH processing more efficient and viable in the forwarding plane.

   [I-D.ietf-6man-eh-limits] defines the IPv6 router requirements and
   how to protect a router from excessive header chain and excessive
   header options with various limitations that can be defined on a
   router.  Per [RFC8200] HBH options must be processed serially.
   However, an implementation of options processing can be done with
   more parallelism in serial processing by grouping similar options to
   be processed in parallel.

   Each Option is encoded in a TLV and so processing of a long list of
   TLVs is expensive.  Zero data length encoded options TLVs are a valid
   option with a minimum length of two bytes.  A DOS vector could be
   easily generated by encoding around 700 HBH options (Zero data
   length) in a standard 1500 MTU packet.  Limiting the number of
   options that are processed could avoid an arbitrary large amount of
   processing for a single EH.

5.  Specification of RFC 8200

   As specified in [RFC8200], the HBH Options header is used to carry
   optional information that will be examined and processed by every
   node along a packet's delivery path, and it is identified by a Next
   Header value of zero in the IPv6 header.

   As per [RFC8200], it is now expected that nodes along a packet's
   delivery path only examine and process the Hop-by-Hop Options header
   if explicitly configured to do so.  This means that the HBH
   processing behavior in a node depends on its configuration.

   However, in the current [RFC8200], there is no explicit specification
   of the possible configurations leading to likely uncertain processing
   behaviors, that is, the nodes may be configured to ignore the HBH
   Options Header, drop packets containing a HBH Options Header, or
   assign packets containing a HBH Options Header to the control plane
   [RFC8200].  This specification is updated in
   [I-D.ietf-6man-hbh-processing].




Peng, et al.             Expires 20 August 2024                 [Page 6]

Internet-Draft           Processing HBH Opt Hdr            February 2024


6.  Common Implementations

   Current routers deployed by operators usually process an IPv6 packet
   that has a Next Header field set to 0 by directly forwarding it to
   the control plane of the node.  With such implementations, the value
   of the Next Header field in the IPv6 header is the only trigger for
   the default processing behavior.  The option type of each option
   carried within the HBH Options Header is not even examined before the
   packet is sent to the control plane.

   Very often, such processing behavior is the default configuration on
   the node, which is embedded in the implementation and cannot be
   changed or reconfigured.

   Another critical component of IPv6 HBH processing, in some cases
   overlooked, is that an operator core network can be designed to use
   the global Internet routing table for internet traffic and in other
   cases use an overlay MPLS VPN to carry Internet traffic.

   In the global Internet routing table scenario where only an underlay
   global routing table exists, and no VPN overlay carrying customer
   Internet traffic, the IPv6 HBH options could be used as a DOS attack
   vector for both the operator nodes, adjacent inter-AS peer nodes, as
   well as customer nodes along a path.

   In a case where the Internet routing table is carried in an MPLS VPN
   overlay payload, the HBH options header does not impact the operator
   underlay framework and only impacts the VPN overlay payload.  Thus
   the operator underlay top most label global table routing FEC LSP
   instantiation is not impacted as the operator underlay is within the
   operators closed domain.

   However, the HBH options DOS attack vector in the VPN overlay can
   still impact the customer end nodes as well as other adjacent inter-
   AS operators that only use the underlay global Internet routing
   table.  In an operator domain where an MPLS VPN overlay is utilized
   to carry internet traffic, the operator has full control of the
   underlay and IPv6 Extension Header chain length as well as the number
   of HBH options encoded [I-D.ietf-6man-eh-limits].

   In the global routing table scenario for Internet traffic there is no
   way to control the IPv6 Extended header chain length as well as the
   number of HBH options encoded.

   When IPv6 was first implemented on high-speed routers, HBH options
   were not yet well-understood and ASICs were not as capable as they
   are today.  So, early IPv6 implementations dispatched all packets
   that contain HBH options to their control plane.  Such implementation



Peng, et al.             Expires 20 August 2024                 [Page 7]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   introduces a risk of a DoS attack on the control plane of the node,
   and a large flow of IPv6 packets could congest the control plane,
   causing other critical functions (including routing and network
   management) that are executed on the control plane to fail.  Rate
   limiting mechanisms will cause inconsistent packet drops and impact
   the normal IP forwarding of packets.

7.  Typical Processing

   To mitigate this DoS vulnerability, many operators have deployed
   Access Control Lists (ACLs) that discard all packets containing HBH
   Options [RFC9288].

   [RFC6564] shows the Reports from the field indicating that some IP
   routers deployed within the global Internet are configured either to
   ignore or to drop packets having a hop-by-hop header.  As stated in
   [RFC7872], many network operators perceive HBH Options to be a breach
   of the separation between the forwarding and control planes.
   Therefore, several network operators configured their nodes so as to
   discard all packets containing the HBH Options Extension Header,
   while others configured nodes to forward the packet but to ignore the
   HBH Options.  [RFC7045] also states that hop-by-hop options are not
   handled by many high-speed routers or are processed only on a control
   plane.  [I-D.vyncke-v6ops-james] shows that the HBH options header
   cannot reliably traverse the global Internet; only small headers with
   'skippable' options have some chances.

   Due to such behaviors observed and described in these specifications,
   [RFC8200] did not recommend new HBH Options, which limited the
   usability of HBH Options.

   Besides service providers' networks, other sectors such as industrial
   IoT networks are slowly replacing a dozen of semi-proprietary
   protocols in industrial automation into IP.  The proper processing of
   the HBH options header is also required
   [I-D.pthubert-detnet-ipv6-hbh].

8.  Design Principles

   Here are some design principles for HBH Options Header and its
   carrying Options.

   *  The HBH Options Header should not become a possible DDoS Vector.
      Therefore, the control plane needs to be preserved from unwanted
      incoming traffic due to HBH header present in the packet.






Peng, et al.             Expires 20 August 2024                 [Page 8]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   *  HBH Options need to be designed in a manner so that they don't
      reduce the probability of packet delivery, especially in length
      limit.

   *  HBH processing implementations need to perform well at a
      reasonable cost without endangering the security of the router.

   *  The Router Alert Option needs not to impact the processing of
      other HBH Options that should be processed more quickly
      [I-D.ietf-6man-hbh-processing].

   *  HBH Options can influence how a packet is forwarded.  However,
      with the exception of the Router Alert Option, an HBH Option must
      not cause control plane state to be created, modified or destroyed
      on the processing node.  As per [RFC6398], protocol developers
      SHOULD avoid future use of the Router Alert Option.

   *  The limits specified in [I-D.ietf-6man-eh-limits] need to be
      configurable to manage HBH processing so it doesn't become a
      bottleneck.

   *  MLDv2 [RFC3810] should not be forbidden.

9.  Migration Strategies

   In order to make the HBH Options Header usable and facilitate the
   ever-emerging new services to be deployed across multiple vendors'
   devices, the new specifications related to the processing of HBH
   Options Header need to be designed to allow a smooth migration from
   old to new behavior without disruption time.

10.  Security Considerations

   The security considerations can refer to
   [I-D.ietf-6man-hbh-processing], [RFC7045], [RFC7112], [RFC8200],
   [RFC4302], and [RFC4303].

11.  IANA Considerations

   This document does not include an IANA request.

12.  Acknowledgements

   The authors would like to acknowledge Ron Bonica, Fred Baker, Bob
   Hinden, Stefano Previdi, and Donald Eastlake, Gorry Fairhurst, Nick
   Hilliard, Tom Herbert, Haisheng Yu, Nalini Elkins, and Alexandre
   Petrescu for their valuable review and comments.




Peng, et al.             Expires 20 August 2024                 [Page 9]

Internet-Draft           Processing HBH Opt Hdr            February 2024


13.  References

13.1.  Normative References

   [I-D.ietf-6man-eh-limits]
              Herbert, T., "Limits on Sending and Processing IPv6
              Extension Headers", Work in Progress, Internet-Draft,
              draft-ietf-6man-eh-limits-12, 18 December 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-6man-eh-
              limits-12>.

   [I-D.ietf-6man-hbh-processing]
              Hinden, R. M. and G. Fairhurst, "IPv6 Hop-by-Hop Options
              Processing Procedures", Work in Progress, Internet-Draft,
              draft-ietf-6man-hbh-processing-12, 21 November 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-6man-
              hbh-processing-12>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC2711]  Partridge, C. and A. Jackson, "IPv6 Router Alert Option",
              RFC 2711, DOI 10.17487/RFC2711, October 1999,
              <https://www.rfc-editor.org/info/rfc2711>.

   [RFC3810]  Vida, R., Ed. and L. Costa, Ed., "Multicast Listener
              Discovery Version 2 (MLDv2) for IPv6", RFC 3810,
              DOI 10.17487/RFC3810, June 2004,
              <https://www.rfc-editor.org/info/rfc3810>.

   [RFC4302]  Kent, S., "IP Authentication Header", RFC 4302,
              DOI 10.17487/RFC4302, December 2005,
              <https://www.rfc-editor.org/info/rfc4302>.

   [RFC4303]  Kent, S., "IP Encapsulating Security Payload (ESP)",
              RFC 4303, DOI 10.17487/RFC4303, December 2005,
              <https://www.rfc-editor.org/info/rfc4303>.

   [RFC6564]  Krishnan, S., Woodyatt, J., Kline, E., Hoagland, J., and
              M. Bhatia, "A Uniform Format for IPv6 Extension Headers",
              RFC 6564, DOI 10.17487/RFC6564, April 2012,
              <https://www.rfc-editor.org/info/rfc6564>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.



Peng, et al.             Expires 20 August 2024                [Page 10]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   [RFC8200]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", STD 86, RFC 8200,
              DOI 10.17487/RFC8200, July 2017,
              <https://www.rfc-editor.org/info/rfc8200>.

13.2.  Informative References

   [I-D.ietf-6man-enhanced-vpn-vtn-id]
              Dong, J., Li, Z., Xie, C., Ma, C., and G. S. Mishra,
              "Carrying Virtual Transport Network (VTN) Information in
              IPv6 Extension Header", Work in Progress, Internet-Draft,
              draft-ietf-6man-enhanced-vpn-vtn-id-05, 6 July 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-6man-
              enhanced-vpn-vtn-id-05>.

   [I-D.pthubert-detnet-ipv6-hbh]
              Thubert, P. and F. Yang, "IPv6 Options for DetNet", Work
              in Progress, Internet-Draft, draft-pthubert-detnet-ipv6-
              hbh-07, 22 February 2022,
              <https://datatracker.ietf.org/doc/html/draft-pthubert-
              detnet-ipv6-hbh-07>.

   [I-D.vyncke-v6ops-james]
              Vyncke, E., Léas, R., and J. Iurman, "Just Another
              Measurement of Extension header Survivability (JAMES)",
              Work in Progress, Internet-Draft, draft-vyncke-v6ops-
              james-03, 9 January 2023,
              <https://datatracker.ietf.org/doc/html/draft-vyncke-v6ops-
              james-03>.

   [P4]       https://p4.org/, "P4".

   [RFC6192]  Dugal, D., Pignataro, C., and R. Dunn, "Protecting the
              Router Control Plane", RFC 6192, DOI 10.17487/RFC6192,
              March 2011, <https://www.rfc-editor.org/info/rfc6192>.

   [RFC6398]  Le Faucheur, F., Ed., "IP Router Alert Considerations and
              Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
              2011, <https://www.rfc-editor.org/info/rfc6398>.

   [RFC7045]  Carpenter, B. and S. Jiang, "Transmission and Processing
              of IPv6 Extension Headers", RFC 7045,
              DOI 10.17487/RFC7045, December 2013,
              <https://www.rfc-editor.org/info/rfc7045>.







Peng, et al.             Expires 20 August 2024                [Page 11]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   [RFC7112]  Gont, F., Manral, V., and R. Bonica, "Implications of
              Oversized IPv6 Header Chains", RFC 7112,
              DOI 10.17487/RFC7112, January 2014,
              <https://www.rfc-editor.org/info/rfc7112>.

   [RFC7872]  Gont, F., Linkova, J., Chown, T., and W. Liu,
              "Observations on the Dropping of Packets with IPv6
              Extension Headers in the Real World", RFC 7872,
              DOI 10.17487/RFC7872, June 2016,
              <https://www.rfc-editor.org/info/rfc7872>.

   [RFC8250]  Elkins, N., Hamilton, R., and M. Ackermann, "IPv6
              Performance and Diagnostic Metrics (PDM) Destination
              Option", RFC 8250, DOI 10.17487/RFC8250, September 2017,
              <https://www.rfc-editor.org/info/rfc8250>.

   [RFC9098]  Gont, F., Hilliard, N., Doering, G., Kumari, W., Huston,
              G., and W. Liu, "Operational Implications of IPv6 Packets
              with Extension Headers", RFC 9098, DOI 10.17487/RFC9098,
              September 2021, <https://www.rfc-editor.org/info/rfc9098>.

   [RFC9268]  Hinden, R. and G. Fairhurst, "IPv6 Minimum Path MTU Hop-
              by-Hop Option", RFC 9268, DOI 10.17487/RFC9268, August
              2022, <https://www.rfc-editor.org/info/rfc9268>.

   [RFC9288]  Gont, F. and W. Liu, "Recommendations on the Filtering of
              IPv6 Packets Containing IPv6 Extension Headers at Transit
              Routers", RFC 9288, DOI 10.17487/RFC9288, August 2022,
              <https://www.rfc-editor.org/info/rfc9288>.

   [RFC9343]  Fioccola, G., Zhou, T., Cociglio, M., Qin, F., and R.
              Pang, "IPv6 Application of the Alternate-Marking Method",
              RFC 9343, DOI 10.17487/RFC9343, December 2022,
              <https://www.rfc-editor.org/info/rfc9343>.

   [RFC9486]  Bhandari, S., Ed. and F. Brockners, Ed., "IPv6 Options for
              In Situ Operations, Administration, and Maintenance
              (IOAM)", RFC 9486, DOI 10.17487/RFC9486, September 2023,
              <https://www.rfc-editor.org/info/rfc9486>.

Authors' Addresses

   Shuping Peng
   Huawei Technologies
   Beijing
   China
   Email: pengshuping@huawei.com




Peng, et al.             Expires 20 August 2024                [Page 12]

Internet-Draft           Processing HBH Opt Hdr            February 2024


   Zhenbin Li
   Huawei Technologies
   Beijing
   China
   Email: lizhenbin@huawei.com


   Chongfeng Xie
   China Telecom
   China
   Email: xiechf@chinatelecom.cn


   Zhuangzhuang Qin
   China Unicom
   Beijing
   China
   Email: qinzhuangzhuang@chinaunicom.cn


   Gyan Mishra
   Verizon Inc.
   United States of America
   Email: gyan.s.mishra@verizon.com



























Peng, et al.             Expires 20 August 2024                [Page 13]