Internet DRAFT - draft-raszuk-lsr-imp
draft-raszuk-lsr-imp
LSR Working Group R. Raszuk, Ed.
Internet-Draft NTT NI
Intended status: Standards Track 8 July 2022
Expires: 9 January 2023
IGP Monitoring Protocol (IMP)
draft-raszuk-lsr-imp-00
Abstract
This document defines a new point to point protocol to carry
information present in link state database of OSPF and ISIS Interior
Gateway Protocols (IGPs) as well as in Traffic Engineering Database
(TED).
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 9 January 2023.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
Raszuk Expires 9 January 2023 [Page 1]
Internet-Draft IMP July 2022
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Abbreviations . . . . . . . . . . . . . . . . . . . . . . 3
3. Transport . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Common Header . . . . . . . . . . . . . . . . . . . . . . . . 4
5. DATA Message . . . . . . . . . . . . . . . . . . . . . . . . 5
6. REQUEST Message . . . . . . . . . . . . . . . . . . . . . . . 7
7. FILTER Message . . . . . . . . . . . . . . . . . . . . . . . 7
7.1. FILTER TLVs . . . . . . . . . . . . . . . . . . . . . . . 8
8. Handling multiple IGP instances . . . . . . . . . . . . . . . 9
9. Deployment and operational considerations . . . . . . . . . . 10
10. Capability Advertisement . . . . . . . . . . . . . . . . . . 10
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
11.1. IMP Message Types . . . . . . . . . . . . . . . . . . . 10
11.2. DATA Types . . . . . . . . . . . . . . . . . . . . . . . 11
11.3. FILTER TLV Types . . . . . . . . . . . . . . . . . . . . 11
12. Security Considerations . . . . . . . . . . . . . . . . . . . 12
13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 12
14. Normative References . . . . . . . . . . . . . . . . . . . . 12
15. Informative References . . . . . . . . . . . . . . . . . . . 13
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 13
1. Introduction
With the growing number of network programmability and central
control there is an increased need to share topology, link and node
information from each IGP area. Such requirements traditionally were
fulfilled by establishing an IGP adjacency between such central
entities and selected nodes in each area. Often that adjacency was
established over a tunnel interface.
In recent years selected link state and TE information have been
carried by BGP4 extension called BGP-LS [RFC7752]. However with the
growing number of IGP extensions, application aware networking (APN),
new per node network actions and ongoing link state protocols
extensions load of BGP-LS on BGP protocol development, testing and
deployments keeps increasing. Moreover BGP is a point-to-multipoint
protocol which does not make it a good fit to propagate point-to-
point information.
Raszuk Expires 9 January 2023 [Page 2]
Internet-Draft IMP July 2022
In addition to the above requirements IGP Monitoring Protocol should
provide ability to simplify operations of the network and assist when
enhanced troubleshooting is required. The below proposal addresses
that requirement as well.
The primary inspiration for this work has been based on the success
of BGP Monitoring Protocol (BMP) [RFC7854] which in a number of
aspects shares the same high level requirements - point to point
routing information distribution, protocol observability and enhanced
operations. It also needs to be highlighted that BMP (while it
technically could) does not use native BGP sessions to propagate such
information, but is running a separate transport. IMP authors have
chosen to reuse selected BMP building blocks and BMP operational and
deployment experience.
2. Terminology
2.1. Abbreviations
* IGP - Interior Gateway Protocol
* LSDB - Links State Database
* TED - Traffic Engineering Database
* OSPF - Open Shortest Path First
* ISIS - Intermediate System to Intermediate System Protocol
* SPAN - Switched Port Analyzer
* YANG - Yet Another Next Generation
* DBD - Database Description
* CSNP - Complete Sequence Number PDU
* PSNP - Partial Sequence Number PDU
* TLV - Type Length Value
* LSA - Link State Advertisement
* LSP - Link State PDU
* PDU - Protocol Data Unit
* QUIC - Quick UDP Internet Connections
3. Transport
IGP Monitoring Protocol messages can be transported over either TCP
session or UDP based QUIC transport [RFC9000]. The use of QUIC
protocol is recommended however for backwards compatibility with
existing deployments of BGP-LS [RFC7752] use of TCP session can also
be leveraged.
Irrespective of the choice of transport layer the IMP messages would
remain identical.
TCP session SHOULD be configured with TCP AO and QUIC SHOULD be used
with its native security.
Raszuk Expires 9 January 2023 [Page 3]
Internet-Draft IMP July 2022
IMP operates in point-to-point mode. What information is sent can be
either configured statically or learned dynamically in a PUB-SUB
fashion.
IMP protocol operates between two nodes: Producer and Receiver. The
ultimate destination can be many Producer-Receiver hops away. The
following modes of operations are independently permitted for each
data type:
* MODE "A" - PUSH - Only IMP DATA messages containing given data
type(s) are sent only from Producer to Receiver(s). What is being
sent is subject to local configuration on the Producer. No
filtering is permitted on the Producer.
* MODE "B" - F_PUSH - IMP DATA messages are sent from Producer to
Receiver. Receiver may request a subset of data types by sending
FILTER message(s) to the Producer. Producer may honor that filter
or drop it.
* MODE "C" - PUB-SUB - Before any DATA messages are sent from
Producer, Receiver MUST register interest in specific data type(s)
by sending REQUEST messages.
* MODE "D" F_PUB-SUB - MODE "C" with subset of data as communicated
by Receiver in sending FILTER message(s).
4. Common Header
The below common header will appear in all IMP messages.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+
| Version |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Message Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Msg. Type |
+---------------+
Figure 1: IMP Common Header
* o Version (1 byte): Indicates the IMP version. This is set to '1'
for all messages defined in this specification. Versions 0 and
255 are reserved and MUST NOT be used.
Raszuk Expires 9 January 2023 [Page 4]
Internet-Draft IMP July 2022
* o Message Length (4 bytes): Length of the message in bytes
(including common header, data, and encapsulated messages, if
any).
* o Message Type (1 byte): This identifies the type of the IMP
message. An IMP implementation MUST ignore unrecognized message
types upon receipt. This document defines the following type
codes:
* 1 - DATA
* 2 - REQUEST
* 3 - FILTER
5. DATA Message
IMP can carry different types of protocol and local system data. All
types of DATA Messages are propagated from Producer to Receiver(s).
Except DATA Type 1 all other DATA Types are optional. All DATA Types
are subject to both implementation exposure and operator's
permission.
The following figure illustrates DATA Message Header:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Router Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| DATA Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Data (variable) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 2: IMP DATA Message Header
Router Identifier - Producer's 4 octet Router ID to uniquly identify
the sender data. For ISIS if 4 octet Router ID is not configured
IPv4 address of lowest loopback interface SHOULD be used.
DATA Type - The below list of DATA Types are defined by this
specification. DATA Type 0x0000 and 0xFFFF are reserved for special
use.
Raszuk Expires 9 January 2023 [Page 5]
Internet-Draft IMP July 2022
IMP specification focuses on propagating information carried in link
state protocols along with any extensions. The base specifications
for protocols are: OSPFv2 [RFC2328], OSPFv3 [RFC5340] and ISIS
[RFC1195].
* DATA Type 1 - BGP-LS NLRI of AFI 16388 SAFI 71
* DATA Type 2 - BGP-LS NLRI of AFI 16388 SAFI 72
* DATA Type 3 - OSPFv2 native LSDB Synchronization using DBDs
* DATA Type 4 - OSPFv3 native LSDB Synchronization using DBDs
* DATA Type 5 - ISIS native LSDB Synchronization using CSNPs
* DATA Type 6 - ISIS native LSDB Synchronization using PSNPs
* DATA Type 7 - OSPFv2 LSDB Content - YANG model
* DATA Type 8 - OSPFv3 LSDB Content- YANG model
* DATA Type 9 - ISIS LSDB Content - YANG model
* DATA Type 10 - OSPFv2 and OSPFv3 packets inbound mirroring
* DATA Type 11 - OSPFv2 and OSPFv3 packets onbound mirroring
* DATA Type 12 - ISIS PDUs inbound mirroring
* DATA Type 13 - ISIS PDUs outbound mirroring
* DATA Type 14 - OSPFv2 configuration - XML format
* DATA Type 15 - OSPFv2 configuration - JSON format
* DATA Type 16 - OSPFv3 configuration - XML format
* DATA Type 17 - OSPFv3 configuration - JSON format
* DATA Type 18 - ISIS configuration - XML format
* DATA Type 19 - ISIS configuration - JSON format
An implementation MAY provide means to apply additional filtering to
send only subset of DATA Types or fields within specific DATA Type.
An implementation MAY provide facilities to define thresholds where a
given type of information may be sent immediately or could be sent
with predefined delay only when the absolute value contained exceeds
threshold.
For DATA Types containing BGP-LS data the encoding is identical to
what is defined in the main BGP-LS specification [RFC7752] and all
extensions. The nature of data is incremental and only changes are
propagated.
Native LSBD synchronization the data block follows frequency of
identical data sent to any neighbour.
Structured DATA Types using YANG, XML or JSON encoding first data
block should contain the entire dataset followed by incremental
updates only when changes occur.
Raszuk Expires 9 January 2023 [Page 6]
Internet-Draft IMP July 2022
Raw DATA Types are asynchronous by design and reflect what protocol
communication takes place on a given interface(es).
6. REQUEST Message
REQUEST Message is an optional IMP message allowing Receiver to list
what DATA Types it is interested in receving. The following figure
illustrates REQUEST Message type:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receiver Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 1-N DATA Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| .... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3: IMP REQUEST Message Header
Receiver Identifier - Receiver's domain wide unique 4 octet
identifier.
Enumerated DATA Types included in REQUEST Message payload indicate to
the Producer which DATA Types Receiver is subscribing to.
REQUEST Message containing DATA Type 0x0000 indicates unsubscription
from any DATA Types.
Each non-empty consecutive REQUEST Message received from a given
Receiver is an implicit withdrawal of any previously received
subscription. It is also an explicit overwrite of any locally
configured permit policy.
The size of valid REQUEST Message including Common Header is 10+(N*2)
octets where N >= 1.
7. FILTER Message
FILTER Message is an optional IMP message allowing Receiver to send
additional set of filters to what subset of specific protocol
messages within DATA Types it is interested in receiving. The
following figure illustrates FILTER Message type:
Raszuk Expires 9 January 2023 [Page 7]
Internet-Draft IMP July 2022
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receiver Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| DATA Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 1-N FILTER TLVs |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: IMP FILTER Message Header
Receiver Identifier - Receiver's domain wide unique 4 octet
identifier.
DATA Types included in FILTER Message indicate to which DATA Types
enclosed filter TLVs apply.
Minimal FILTER Message size including Common Header is 12 octets (no
FILTER TLVs is included). Meaning of such message is removal of all
previously advertised filters for a given DATA Type.
Each non-empty consecutive FILTER Message received from a given
Receiver is an implicit withdrawal of any previously received
subscription. TLVs sent are replacing any previously sent FILTERS
for a given DATA Type.
Filter TLVs are scoped and their structure depends on the DATA Type
they are to filter. Presence of multiple TLVs in a FILTER Message is
a logical AND. A single FILTER message may contain Filter TLVs of
multiple types.
7.1. FILTER TLVs
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TLV Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Value (Variable) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5: IMP FILTER TLV
* TLV Type: Fixed two octet number indicating name of the defined
TLV
Raszuk Expires 9 January 2023 [Page 8]
Internet-Draft IMP July 2022
* Length: Fixed two octet length of the TLV including its header in
octets
* Value: Variable size in multiplication of octets containing the
filter value
The following Filter TLVs are defined in this document. Definition
of more Filter TLVs may be added in this or any future
specificiations.
* Type 1: BGP-LS NLRI Type
* Length: 5 octets
* Value: 1 octet - IANA Registry: BGP-LS NLRI-Types
* Applicability: DATA Type 1, DATA Type 2
* Type 2: BGP-LS Descriptors
* Length: 6 octets
* Value: 2 octet - IANA Registry: BGP-LS Node Descriptor, Link
Descriptor, Prefix Descriptor, and Attribute TLVs
* Applicability: DATA Type 1, DATA Type 2
* Type 3: OSPFv2 DBD LS Type
* Length: 5 octets
* Value: 1 octet - IANA Registry: OSPFv2 Link State (LS) Type
* Applicability: DATA Types: 3, 7, 10, 11
* Type 4: OSPFv3 DBD LSA Function Codes
* Length: 6 octets
* Value: 2 octet - IANA Registry: OSPFv3 LSA Function Codes
* Applicability: DATA Types: 4, 8, 10, 11
* Type 5: ISIS Top-Level TLV Codepoints
* Length: 6 octets
* Value: 2 octet - IANA Registry: IS-IS Top-Level TLV Codepoints
* Applicability: DATA Types: 5, 6, 9, 12, 13
8. Handling multiple IGP instances
Network elements may support multiple instances of IGP protocols.
The IMP Messages as defined in this specification are applicable to a
single IGP instance. When multiple IGP instances are enabled each
should maintain a separate IMP session. In such cases each instance
also should identify itself with a different 4 octet Router-ID.
Raszuk Expires 9 January 2023 [Page 9]
Internet-Draft IMP July 2022
9. Deployment and operational considerations
While the specification defines protocol to operate between two nodes
a given deployment may operate across more then two nodes. An IMP
node may act as Producer's proxy. In such a scenario the same node
can act as Receiver on one side and as Producer for other Receiver(s)
on the other one. Different TCP ports MAY be used on a per session
basis.
The focus of IMP is to feed operational data to network controllers
and assist in network monitoring, analysis and debugging. But is it
also directly possible to share information about the state of nodes
and/or links from a given area to other areas in a form of unicast
instead of using native IGP flooding. This is especially interesting
when information shared is required by a subset of routers in other
areas. For example, indication of node down events can be propagated
using IMP to any other interested nodes. For scalability use of one
or more Producer's proxies is recommended.
When an IMP Producer receives an unrecognized message or unrecognized
type such message SHOULD be ignored and error notification sent to
system log. Currently authors purposely did not extend the protocol
with a separate ERROR Message to communicate back to the Receiver the
unrecognized part of the REQUEST or FILTER Message.
When an IMP Receiver detects an unrecognized part of DATA Message it
should log it locally and if possible continue parsing the remaining
data.
10. Capability Advertisement
This document does not require any new capability to be defined.
11. IANA Considerations
This document defines a new IGP Monitoring Protocol (IMP) and it is
expected that IANA creates a new group as well as a number of
following registries to maintain its parameters.
11.1. IMP Message Types
This document defines 1 octet IMP message types to be tracked by IMP
Message Type Registry. Currently three values are defined:
* 1 - DATA
* 2 - REQUEST
* 3 - FILTER
Raszuk Expires 9 January 2023 [Page 10]
Internet-Draft IMP July 2022
Values 0 and 255 are to be marked as Reserved. Type values 1 through
127 MUST be assigned using the "Standards Action" policy, and values
128 through 250 using the "Specification Required" policy defined in
[RFC5226]. Values 251 through 254 are Experimental.
11.2. DATA Types
This document defines two octet DATA Types to be tracked by IMP DATA
Types Registry. Currently nighteen values are defined:
* DATA Type 1 - BGP-LS NLRI of AFI 16388 SAFI 71
* DATA Type 2 - BGP-LS NLRI of AFI 16388 SAFI 72
* DATA Type 3 - OSPFv2 native LSDB Synchronization using DBDs
* DATA Type 4 - OSPFv3 native LSDB Synchronization using DBDs
* DATA Type 5 - ISIS native LSDB Synchronization using CSNPs
* DATA Type 6 - ISIS native LSDB Synchronization using PSNPs
* DATA Type 7 - OSPFv2 LSDB Content - YANG model
* DATA Type 8 - OSPFv3 LSDB Content- YANG model
* DATA Type 9 - ISIS LSDB Content - YANG model
* DATA Type 10 - OSPFv2 and OSPFv3 packets inbound mirroring
* DATA Type 11 - OSPFv2 and OSPFv3 packets onbound mirroring
* DATA Type 12 - ISIS PDUs inbound mirroring
* DATA Type 13 - ISIS PDUs outbound mirroring
* DATA Type 14 - OSPFv2 configuration - XML format
* DATA Type 15 - OSPFv2 configuration - JSON format
* DATA Type 16 - OSPFv3 configuration - XML format
* DATA Type 17 - OSPFv3 configuration - JSON format
* DATA Type 18 - ISIS configuration - XML format
* DATA Type 19 - ISIS configuration - JSON format
Values 0 and 65535 are to be marked as Reserved. Type values 1
through 32767 MUST be assigned using the "Standards Action" policy,
and values 32768 through 65530 using the "Specification Required"
policy defined in [RFC5226]. Values 65531 through 65534 are
Experimental.
11.3. FILTER TLV Types
IANA is to allocate FILTER TLV Types Registry.
This document defines two octet FILTER TLV Types to be tracked by IMP
FILTER TLV Types Registry. Currently five values are defined:
* Type 1: BGP-LS NLRI Type
* Type 2: BGP-LS Descriptors
* Type 3: OSPFv2 DBD LS Type
* Type 4: OSPFv3 DBD LSA Function Codes
* Type 5: ISIS Top-Level TLV Codepoints
Raszuk Expires 9 January 2023 [Page 11]
Internet-Draft IMP July 2022
Values 0 and 65535 are to be marked as Reserved. Type values 1
through 32767 MUST be assigned using the "Standards Action" policy,
and values 32768 through 65530 using the "Specification Required"
policy defined in [RFC5226]. Values 65531 through 65534 are
Experimental.
12. Security Considerations
This document defines a new method to obtain link state protocol data
from network elements. The protocol defines a number of deployment
scenarios, however critical network infrastructure is not expected to
support all of them. Their role should be limited to export
information to a minimal number of Receivers. It is the Receiver
which can further filter the available information (acting as
Producer's proxies) and share further optionally in PUB-SUB mode to
interested parties.
Due to the very sensitive nature of the link state data IMP sessions
MUST either be authenticated (TCP-A0) or native protocol security
enabled (QUIC).
The allowed peers to exchange IMP messages SHOULD be explicitly
configured.
In cases where TCP is used the listening port is subject to a local
configuration by the operator to even further make it not a well
known attack target.
In deployments where the security considerations outlined above are
still a concern, users of this protocol should use IPsec [RFC4303] in
tunnel mode with pre-shared keys.
13. Acknowledgements
....
14. Normative References
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <https://www.rfc-editor.org/info/rfc1195>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Raszuk Expires 9 January 2023 [Page 12]
Internet-Draft IMP July 2022
[RFC2328] Moy, J., "OSPF Version 2", STD 54, RFC 2328,
DOI 10.17487/RFC2328, April 1998,
<https://www.rfc-editor.org/info/rfc2328>.
[RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008,
<https://www.rfc-editor.org/info/rfc5340>.
[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and
S. Ray, "North-Bound Distribution of Link-State and
Traffic Engineering (TE) Information Using BGP", RFC 7752,
DOI 10.17487/RFC7752, March 2016,
<https://www.rfc-editor.org/info/rfc7752>.
15. Informative References
[RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)",
RFC 4303, DOI 10.17487/RFC4303, December 2005,
<https://www.rfc-editor.org/info/rfc4303>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", RFC 5226,
DOI 10.17487/RFC5226, May 2008,
<https://www.rfc-editor.org/info/rfc5226>.
[RFC7854] Scudder, J., Ed., Fernando, R., and S. Stuart, "BGP
Monitoring Protocol (BMP)", RFC 7854,
DOI 10.17487/RFC7854, June 2016,
<https://www.rfc-editor.org/info/rfc7854>.
[RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
Multiplexed and Secure Transport", RFC 9000,
DOI 10.17487/RFC9000, May 2021,
<https://www.rfc-editor.org/info/rfc9000>.
Author's Address
Robert Raszuk (editor)
NTT NI
Email: robert@raszuk.net
Raszuk Expires 9 January 2023 [Page 13]