<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wkumari-intarea-safe-limited-domains-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="safer-limited-domains">Safe(r) Limited Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-wkumari-intarea-safe-limited-domains-06"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="A." surname="Alston" fullname="Andrew Alston">
      <organization>Alston Networks</organization>
      <address>
        <email>alston.networks@gmail.com</email>
      </address>
    </author>
    <author initials="É." surname="Vyncke" fullname="Éric Vyncke">
      <organization>Cisco</organization>
      <address>
        <email>evyncke@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Krishnan" fullname="Suresh Krishnan">
      <organization>Cisco</organization>
      <address>
        <email>suresh.krishnan@gmail.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
      <organization>Independent</organization>
      <address>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>

<t>Documents describing protocols that are only intended to be used within
"limited domains" often do not clearly define how the boundary of the limited
domain is implemented and enforced, or require that operators of these limited
domains perfectly filter at all of the boundary nodes of the domain to
protect the rest of the global Internet from these protocols and vice-versa.</t>
      <t>This document discusses some design principles and offers mechanisms to
allow protocols that are designed to operate in a limited domain "fail-closed"
rather than "fail-open", thereby making these protocols safer to deploy on the
Internet.</t>
      <t>These mechanism are not applicable to all protocols intended for use in a
limited domain, but if implemented on certain classes of protocols, they  can
significantly reduce the risks.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Internet Area Working Group Working Group mailing list (int-area@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/int-area/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/wkumari/draft-wkumari-intarea-safe-limited-domains"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8799"/> discusses the concept of "limited domains", provides examples of
limited domains, as well as Examples of Limited Domain Solutions, including
Service Function Chaining (SFC <xref target="RFC7665"/> ), Segment Routing, "Creative uses
of IPv6 features" (including Extension headers, e.g., for in situ Operations,
Administration, and maintenance <xref target="RFC9378"/>).</t>
      <t>In order to provide context, this document will quote extensively from
<xref target="RFC8799"/>, but it is assumed that the reader will actually read <xref target="RFC8799"/>
in its entirety.</t>
      <t><xref target="RFC8799"/> Section 3, notes:</t>
      <ul empty="true">
        <li>
          <t>A common argument is that if a protocol is intended for limited use, the
chances are very high that it will in fact be used (or misused) in other
scenarios including the so-called open Internet. This is undoubtedly true and
means that limited use is not an excuse for bad design or poor security. In
fact, a limited use requirement potentially adds complexity to both the
protocol and its security design, as discussed later.</t>
        </li>
      </ul>
      <t>Notably, in <xref target="RFC8799"/> Section 2, states:</t>
      <ul empty="true">
        <li>
          <t>Domain boundaries that are defined administratively (e.g., by address
filtering rules in routers) are prone to leakage caused by human error,
especially if the limited domain traffic appears otherwise normal to the
boundary routers. In this case, the network operator needs to take active
steps to protect the boundary. This form of leakage is much less likely if
nodes must be explicitly configured to handle a given limited-domain
protocol, for example, by installing a specific protocol handler.</t>
        </li>
      </ul>
      <t>In addition, <xref target="RFC8799"/> Section 6, notes:</t>
      <ul empty="true">
        <li>
          <t>Today, where limited domains exist, they are essentially created by careful
configuration of boundary routers and firewalls. If a domain is characterized
by one or more address prefixes, address assignment to hosts must also be
carefully managed. This is an error-prone method, and a combination of
configuration errors and default routing can lead to unwanted traffic
escaping the domain. Our basic assumption is therefore that it should be
possible for domains to be created and managed automatically, with minimal
human configuration. We now discuss requirements for automating domain
creation and management.</t>
        </li>
      </ul>
      <t>This document discusses some of the mechanisms which protocol designers can
use to limit the scope of their protocols to a single link. If the protocol is
intended to be used in across multiple links, but should not be forwarded
beyond a single administrative domain, then the protocol designer should
consider making the protocol "fail-closed" rather than "fail-open", as
described below.</t>
      <t>This is primarily targeted towards protocols which are intended to primarily be
used within a single layer-2 broadcast domain, or for protocols which provide a
transport type service (similar to MPLS or SRv6) and are not intended to remain
within a single administrative domain.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="some-types-of-limited-domain-protocols">
      <name>Some types of limited domain protocols</name>
      <t><xref target="RFC8799"/> Section 3 discusses some examples of Limited Domains, based mainly
on the network type (e.g. Home, Sensor Networks, Data Centers, etc).</t>
      <t>This section instead classifies the types of limited domain protocols based
more on their intended use, and technology.</t>
      <t>Broadly speaking, there are two types of limited domain protocols:</t>
      <ul spacing="normal">
        <li>
          <t>Layer-2 type limited domain protocols: These are protocols that are
intended to be used within a single LAN segment.</t>
        </li>
        <li>
          <t>Transport type service (for example MPLS and SRv6): These protocols are
intended to provide a transport service, and are intended to remain
within a single administrative domain such as a Enterprise or a Service
Provider network.</t>
        </li>
      </ul>
    </section>
    <section anchor="fail-open-versus-fail-closed">
      <name>Fail-open versus Fail-closed</name>
      <t>Protocols can be broadly classified as either "fail-open" or "fail-closed".
Fail-closed protocols are those that require explicit interface or device-wide
configuration to enable them to be accepted or processed when received on an
interface.  A classic example of a fail-closed protocol is MPLS (<xref target="RFC3031"/>):
In order to allow MPLS to transit an interface, the operator must enable the
MPLS protocol on that interface and on the device itself.  This ensures that
outside MPLS traffic does not leak in or out of the network / domain.</t>
      <t>Fail-open protocols are those that require explicit configuration in order to
ensure that they do not leak out of a domain, for example, through the
application of filters.  An example of a fail-open protocol is SRv6 - in order
to ensure that SRv6 traffic does not leak out of a network, the operator must
explicitly filter this traffic, and, in order to ensure that SRv6 traffic does
not leak in, the operator must explicitly filter SRv6 traffic.</t>
      <t>Fail-open protocols are inherently riskier than fail-closed protocols, as they
rely on perfect configuration of filters on all interfaces at the boundary of a
domain, and, if the filters are removed for any reason (for example, during
troubleshooting), there is a risk of inbound or outbound leaks.  In addition,
some devices or interfaces may have limitations in the size and complexity of
filters that can be applied, and so adding new filter entries to limit leaks of
a new protocol may not be possible.</t>
      <t>Fail-closed protocols, on the other hand, do not require any explicit
filtering.  In order for the protocol to be accepted and processed when
received on an interface, the operator must explicitly enable the protocol on
that interface and on the device itself.  In addition, there is less risk of
operational mistakes, as it does not rely on filters that may be limited in
number and complexity. Finally, fail-closed protocols do not require that
operators of networks outside of the limited domain implement filters to
protect their networks from the limited domain traffic.</t>
    </section>
    <section anchor="ip-hop-limit-limiting">
      <name>IP Hop-Limit Limiting</name>
      <t>Some limited domain protocols are intended to only be used within a single IP
subnet. In these cases, it may be possible to use the IP Hop-Limit to ensure
that the protocol does not leak out of the subnet.</t>
      <t>By specifying that the IP Hop-Limit of packets carrying the protocol be set to
a value of 1, it is possible to ensure that the protocol does not leak out of
the subnet. This is because routers will decrement the Hop-Limit of packets by
1 when forwarding them, and discard the packet when it reaches zero.</t>
      <t>The approach of setting the IP Hop-Limit to 1 ensures that the protocol does
leave the subnet. This is different from requiring the received IP Hop-Limit
has a value of 255, as used in <xref target="RFC3682"/>, which ensures that traffic cannot
be spoofed from outside the subnet.</t>
      <t>Which option to choose (if either) depends on the specific requirements of the
protocol.</t>
    </section>
    <section anchor="ipv4-multicast-addressing">
      <name>IPv4 Multicast Addressing</name>
      <t>Some protocols (e.g OSPF) use addresses from the IP Local Network Control
Block <xref target="RFC5771"/>, (224.0.0/24). In addition to providing a discovery
mechanism, this traffic is not forwarded off-link, providing a simple and
effective way to limit the scope of the protocol.</t>
      <t>In some (rare) cases, IPv4 "Link Local" addresses (<xref target="RFC3927"/> may be an
appropriate mechanism to limit the scope of the protocol, but this
such a niche case that it is not discussed further here.</t>
    </section>
    <section anchor="ipv6-link-local-addresses">
      <name>IPv6 Link Local Addresses</name>
      <t>Link-Local IPv6 Unicast Addresses (<xref target="RFC4291"/> Section 2.5.6) are used for
communication between nodes on a single link. They are not routable and are not
forwarded by routers. In cases where a limited-domain protocol is intended to
be used only within a single link, the use of IPv6 Link-Local addresses can be
an effective way to limit the scope of the protocol.</t>
    </section>
    <section anchor="making-a-layer-3-type-limited-domain-protocol-fail-closed">
      <name>Making a layer-3 type limited-domain protocol fail-closed</name>
      <t>One way to make a limited-domain protocol fail-closed is to assign it a unique
layer-2 protocol identifier, usually an EtherType. This mechanism is used by
MPLS.  In modern router and hosts, if such a protocol identifier is not enabled
on an interface, then the Ethernet chip-set will ignore the frame, and the node
will not see or process it. Thus, it is necessary to specifically enable the
layer-2 protocol identifier on all relevant interfaces inside the limited
domain, and the protocol will be blocked at the domain boundary where the
protocol has not been so enabled. This is a simple and effective mechanism to
ensure that the protocol does not leak out of the limited domain if and when an
operator makes a mistake in configuring filters based on identifiers appearing
deeper in the frame such as IP addresses or IP protocol or header options.</t>
      <t>This layer-2 protocol identifier technique only works for transport-type
limited domain protocols (i.e., protocols running at layer 3).  Higher layer
protocols cannot necessarily be protected in this way, and so cryptographically
enforced mechanisms may need to be used instead (e.g., as done used by ANIMA in
<xref target="RFC8994"/> and <xref target="RFC8995"/>).</t>
    </section>
    <section anchor="ethernet-protocol-identification">
      <name>Ethernet Protocol Identification</name>
      <t>Figure 1 shows the general format of Ethernet frames. The relevant protocol
identification field occurs after the destination and source MAC addresses and
any tags (such a VLAN tags). The alternatives for protocol identification are
discussed in Section 3 of <xref target="RFC9542"/>.</t>
      <figure anchor="fig1">
        <name>Ethernet Frame Format</name>
        <artwork><![CDATA[
+-----------+-----------+- - - - +----------+--------- - - -+-------+
|Destination|  Source   |Optional| Protocol |  Body of      |Trailer|
|MAC Address|MAC Address|  Tags  |Identifier|   Frame        |       |
+-----------+-----------+ - - - -+----------+--------- - - -+-------|
]]></artwork>
      </figure>
      <t>This document considers EtherType protocol identification. An EtherType is an
unsigned 16-bit field in an Ethernet frame with a value in the range of 0x0600
to 0xFFFF, and so it is a somewhat limited resource; however, there exists a
special Extended EtherType (0x88B7) that can be suffixed by an Organizationally
Unique Identifier (OUI) followed by a further 16-bits identifying the protocol
relative to that OUI as discussed in Section 3 of <xref target="RFC9542"/>. These alternatives
of a direct EtherType or use of the Extended EtherType for the case of the IANA
OUI are illustrated in Figure 2. The following subsections discuss the factors
which may influence the choice between these alternatives when use of such
layer 2 protocol identification, to make the isolation of a limited domain more
robust, is warranted.</t>
      <figure anchor="fig2">
        <name>EtherType Based Protocol Identification</name>
        <artwork><![CDATA[
  01234567 01234567
+--------+--------+
|    EtherType    |
+--------+--------+
Specific EtherType

  01234567 01234567 01234567 01234567 01234567 01234567 01234567
+--------+--------+--------+--------+--------+--------+--------+
|  0x88  |  0xB7  |  0x00  |  0x00  |  0x5E  | Protocol Number |
+--------+--------+--------+--------+--------+--------+--------+
Extended EtherType|         IANA OUI         |IANA Protocol Number
]]></artwork>
      </figure>
      <t>Because specific EtherTypes are a limited resource, an Extended EtherType
<bcp14>SHOULD</bcp14> be used unless there is a strong reason why it will not work
satisfactorily and a specific EtherType is required.</t>
      <section anchor="extended-ethertype-protocol-identification">
        <name>Extended EtherType Protocol Identification</name>
        <t>The main advantage of using an Extended EtherType with an IANA Protocol Number,
as shown in Figure 2, is that such a number can be allocated by IANA with
Expert Review based on an Internet Draft and is thus relatively easy to obtain.
The main disadvantage is that the protocol identification is 5 bytes longer
than a specific dedicated EtherType.</t>
      </section>
      <section anchor="specific-ethertype-protocol-identification">
        <name>Specific EtherType Protocol Identification</name>
        <t>The primary disadvantage of using a specific EtherType, as opposed to an
Extended EtherType, is that assignment of such an EtherType is significantly
more difficult than assignment of an Extended EtherType IANA protocol number.
As discussed in <xref target="RFC9542"/>, a specific EtherType can only be assigned by the
IEEE Registration Authority under the following policy: "Since EtherTypes are a
fairly scarce resource, the IEEE RAC has let us know that they will not assign
a new EtherType to a new IETF protocol specification until the IESG has
approved the protocol specification for publication as an RFC.  In exceptional
cases, the IEEE RA is willing to consider "early allocation" of an EtherType
for an IETF protocol that is still under development as long as the request
comes from and has been vetted by the IESG." (<xref target="RFC9542"/> Appendix B.1, citing
<xref target="IESG_EtherType"/>)</t>
        <t>During development and testing, a protocol can use a "Local Experimental
Ethertype" (0x88b5 and 0x88b6 - <xref target="IANA_EtherType"/>).  Once the protocol is
approved for publication, the IESG can request an EtherType from the IEEE.
However, there is always a risk of some implementation using a Local
Experimental EtherType not getting updated causing conflicts with a later
different use of that experimental EtherType.</t>
        <t>The primary advantage of using a specific EtherType is the saving of 5 bytes
relative to the use of the Extended EtherType with a protocol number under the
IANA OUI.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Protocols are designated as "limited domain" because something unexpected might
happen if they leak outside of a domain with unified management. For example,
VLAN or VPN or overlay identifiers may be misinterpreted resulting in the
delivery of data to or the acceptance of data from unauthorized network nodes
violating intended security constraints. The use of a layer-2 protocol
identifier to provide a "fail closed" barrier at the domain border can
significantly improve security by eliminating the opportunity for such
misinterpretation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan"/>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC3682">
          <front>
            <title>The Generalized TTL Security Mechanism (GTSM)</title>
            <author fullname="V. Gill" initials="V." surname="Gill"/>
            <author fullname="J. Heasley" initials="J." surname="Heasley"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="February" year="2004"/>
            <abstract>
              <t>The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to protect a protocol stack from CPU-utilization based attacks has been proposed in many settings (see for example, RFC 2461). This document generalizes these techniques for use by other protocols such as BGP (RFC 1771), Multicast Source Discovery Protocol (MSDP), Bidirectional Forwarding Detection, and Label Distribution Protocol (LDP) (RFC 3036). While the Generalized TTL Security Mechanism (GTSM) is most effective in protecting directly connected protocol peers, it can also provide a lower level of protection to multi-hop sessions. GTSM is not directly applicable to protocols employing flooding mechanisms (e.g., multicast), and use of multi-hop GTSM should be considered on a case-by-case basis. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3682"/>
          <seriesInfo name="DOI" value="10.17487/RFC3682"/>
        </reference>
        <reference anchor="RFC3927">
          <front>
            <title>Dynamic Configuration of IPv4 Link-Local Addresses</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="E. Guttman" initials="E." surname="Guttman"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>To participate in wide-area IP networking, a host needs to be configured with IP addresses for its interfaces, either manually by the user or automatically from a source on the network such as a Dynamic Host Configuration Protocol (DHCP) server. Unfortunately, such address configuration information may not always be available. It is therefore beneficial for a host to be able to depend on a useful subset of IP networking functions even when no address configuration is available. This document describes how a host may automatically configure an interface with an IPv4 address within the 169.254/16 prefix that is valid for communication with other devices connected to the same physical (or logical) link.</t>
              <t>IPv4 Link-Local addresses are not suitable for communication with devices not directly connected to the same physical (or logical) link, and are only used where stable, routable addresses are not available (such as on ad hoc or isolated networks). This document does not recommend that IPv4 Link-Local addresses and routable addresses be configured simultaneously on the same interface. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3927"/>
          <seriesInfo name="DOI" value="10.17487/RFC3927"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC5771">
          <front>
            <title>IANA Guidelines for IPv4 Multicast Address Assignments</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>This document provides guidance for the Internet Assigned Numbers Authority (IANA) in assigning IPv4 multicast addresses. It obsoletes RFC 3171 and RFC 3138 and updates RFC 2780. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="51"/>
          <seriesInfo name="RFC" value="5771"/>
          <seriesInfo name="DOI" value="10.17487/RFC5771"/>
        </reference>
        <reference anchor="RFC7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"/>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network. It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF. This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="IESG_EtherType">
          <front>
            <title>IESG Statement on EtherTypes</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="May" day="01"/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.ietf.org/about/groups/iesg/statements/ethertypes&gt;"/>
        </reference>
        <reference anchor="IANA_EtherType">
          <front>
            <title>IANA EtherType Registry</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
          <seriesInfo name="Web" value="&lt;https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.xhtml#ieee-802-numbers-1&gt;"/>
        </reference>
      </references>
    </references>
    <?line 373?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much thanks to Deborah Brungard and Brian Carpenter, for their review and
comments.</t>
      <t>Also much thanks to everyone else with whom we have discussed this topic; I've
had numerous discussions with many many people on this, and I'm sure that I've
forgotten some of them. Apologies if you were one of them.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>-01-03:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Security Considerations text about the risks of fail-open protocols and
the benefits of fail-closed protocols.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>01-02:
          </t>
          <ul spacing="normal">
            <li>
              <t>Add Donald Eastlake as an author.</t>
            </li>
            <li>
              <t>Substantial re-write and expansion of material concerning specific and
Extended EtherType protocol identification.</t>
            </li>
            <li>
              <t>Add initial Security Considerations text.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>00-01:
          </t>
          <ul spacing="normal">
            <li>
              <t>Deborah pointed out that "this only works for transport-type limited domain
protocols (e.g., SRv6)" could be read as SRv6 fails-closed.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
