<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-yang-spring-sid-as-source-address-08" category="std" consensus="true" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="SID as source address">SID as source address in SRv6</title>

    <author initials="F." surname="Yang" fullname="Feng Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>yangfeng@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <country>CN</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="09"/>

    <area>RTG</area>
    <workgroup>SPRING</workgroup>
    

    <abstract>


<?line 40?>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>



    </abstract>



  </front>

  <middle>


<?line 44?>

<section anchor="introduction"><name>Introduction</name>

<t>SRv6 is being rapidly deployed and is currently primarily used in trusted-domain backbone networks. Both the carrier market and the enterprise market are adopting SRv6 for end-to-end service delivery. However, if a firewall exists along an SRv6 path, legitimate SRv6 traffic will be dropped. This proposal addresses this issue by using SID as source address in SRv6 packets.</t>

<t>The reason has been elaborated in Section 8.1 of <xref target="I-D.draft-ietf-spring-srv6-security"></xref>. In brief, SRv6 using loopback as source address will cause asymmetric address, which will be blocked by the firewall. As a result, users are forced to encapsulate traffic with multiple layers of tunnel headers—such as IPSec or L2TP—to ensure it can pass through the firewall. This approach introduces two significant issues: first, it increases overhead—for example, IPSec adds approximately 80 bytes of header overhead; second, it undermines the programmability benefits of SRv6, as forwarding is performed based on IPSec rather than SRv6 itself.</t>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="using-srv6-sid-as-source-address"><name>Using SRv6 SID as Source Address</name>

<t>SRv6 endpoints typically create many SIDs. This section describes the method for selecting a SID as the source address.</t>

<section anchor="user-traffic"><name>User Traffic</name>

<t>There are several cases for using SRv6 SID as source address.</t>

<section anchor="l2-vpn-virtual-private-wire-servicevpws"><name>L2 VPN Virtual Private Wire Service(VPWS)</name>

<t>For L2 VPN VPWS case, the user traffic towards SRv6 SD-WAN backbone will be encapsulated in SRv6 tunnel. When constructing an SRv6 packet, the source address field of the SRv6 packet should be assigned with the local VPN  SID value of the PE device. The local VPN SID value can be determined by L2 Cross-Connect.</t>

<figure align="center" anchor="f1" title="L2 VPWS"><artwork type="ascii-art"><![CDATA[
   +------------+
   |     PE     |        +--------------+
   |  +------+  |        |      SRv6    |
---+--| VPWS-+--+--------+              |
   |  +------+  |        |    Backbone  |
   +------------+        +--------------+
]]></artwork></figure>

</section>
<section anchor="l2-vpn-virtual-private-lan-servicevpls"><name>L2 VPN Virtual Private LAN Service(VPLS)</name>

<t>For L2 VPN VPLS, the user traffic towards SRv6 backbone will be encapsulated in SRv6 tunnel. When constructing an SRv6 packet, the source address field of the SRv6 packet should be assigned with the local VPN SID value of the PE device. The local VPN SID value can be determined by L2 VPN VPLS.</t>

<figure align="center" anchor="f2" title="L2 VPLS"><artwork type="ascii-art"><![CDATA[
   +------------+
   |    PE      |        +------------+
   |  +------+  |        |    SRv6    |
---+--+ VPLS +--+--------+            |
   |  +------+  |        |  Backbone  |
   +------------+        +------------+
]]></artwork></figure>

</section>
<section anchor="l3-ipv4ipv6-vpn-service"><name>L3 IPv4/IPv6 VPN Service</name>

<t>For L3 IPv4/IPv6 VPN Service case, the user traffic towards SRv6 backbone will be encapsulated in SRv6 tunnel. When constructing an SRv6 packet, the source address field of the SRv6 packet should be assigned with the local VPN SID value of the PE device. The local VPN SID value can be determined by the L3 IPv4/IPv6 VPN.</t>

<figure align="center" anchor="f3" title="L3 VPN"><artwork type="ascii-art"><![CDATA[
         +-------------+
         |     PE      |    +--------------+
+----+   |  +--------+ |    |     SRv6     |
| CE +---+--+ L3VPN  +-+----+              |
+----+   |  +--------+ |    |   Backbone   |
         +-------------+    +--------------+
]]></artwork></figure>

</section>
</section>
<section anchor="control-traffic"><name>Control Traffic</name>

<t>Control traffic will not be terminated by VPN, thus will not be impacted.</t>

</section>
<section anchor="oam-traffic"><name>OAM Traffic</name>

<t>OAM traffic terminated by the SRv6 tunnel may use the SRv6 SID as source address, such as ping, trace. Refer to RFC 8986 4.1.1, Allowing the processing of specific Upper-Layer header types is useful for Operations, Administration, and Maintenance (OAM).  As an example, an operator might permit pinging of SIDs.  To do this, they may enable local configuration to allow Upper-Layer header type 58(ICMPv6).</t>

</section>
<section anchor="management-traffic"><name>Management Traffic</name>

<t>Management traffic will not be terminated by VPN, thus should not be impacted.</t>

</section>
</section>
<section anchor="use-cases"><name>Use Cases</name>

<section anchor="srv6-network-with-sr-aware-stateful-firewall"><name>SRv6 Network with SR-aware Stateful Firewall</name>

<section anchor="problem-statement"><name>Problem Statement</name>

<t>To provide VPN service in an SRv6 network <xref target="RFC9252"></xref>, the ingress PE encapsulates the payload in an outer IPv6 header with the Segment Routing Header (SRH) <xref target="RFC8754"></xref> carrying the SR Policy segment list along with the VPN Service SID. If the VPN service is with best-effort connectivity, the destination address of the outer IPv6 header carries the VPN service SID and the SRH is omitted.</t>

<t>Along the forwarding path in the SRv6 network, firewalls may be deployed to filter the traffics. If a firewall is SR-aware, it will retrieve the final destination of an SRv6 packet from the last entry in the SRH rather than the destination address field of the IPv6 header <xref target="I-D.draft-ietf-spring-sr-service-programming"></xref>.</t>

<t>A stateful firewall keeps a track of the state of the network connections traveling across it. Whenever a packet arrives to seek permission to pass through it, the firewall checks from its state table if there is an active connection between identified by 3 tuple or 5 tuple. Thus only legitimate packets are allowed to be transmitted across it.</t>

<t><xref target="f4"/> and <xref target="f5"/> show the bidirectional VPN traffic packets passing through a firewall in an SRv6 network.</t>

<t>The source address of the outer IPv6 header is the IPv6 address of
   ingress PE. The final destination address of the outer IPv6 header
   is the VPN Service SID of egress PE. In the SR-Policy-based way, the
   final destination address is encapsulated in the last entry in the
   SRH, Segment[0]. In the best-effort way, the SRH is omitted.</t>

<figure align="center" anchor="f4" title="SR-Policy-based VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
+---+   +---+       +--------+       +---+   +---+
|CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
+---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<figure align="center" anchor="f5" title="Best-Effort VPN Traffic across Firewall"><artwork type="ascii-art"><![CDATA[
 +---+   +---+       +--------+       +---+   +---+
 |CE1|---|PE1|--...--|Firewall|--...--|PE2|---|CE2|
 +---+   +---+       +--------+       +---+   +---+

Packet (PE1 ---> PE2):        Packet (PE1 <--- PE2):
**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-IP-ADDR     *        * SA=PE2-IP-ADDR     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************
*    Eth/IPv4/IPv6   *        *    Eth/IPv4/IPv6   *
* Source=CE1         *        * Source=CE2         *
* Destination=CE2    *        * Destination=CE1    *
**********************        **********************
*       Payload      *        *       Payload      *
**********************        **********************

]]></artwork></figure>

<t>The stateful firewall will check the association relationships of the bidirectional VPN traffic packets. A common implementation may record the key information of the packets on forward way(internal to external), such as source address and destination address. When receiving a packet on backward way(external to internal), it checks the state table if there is an existing forward packet flow. For example, the firewall may require that the source address of packet on backward way matches the destination address of packet on forward way, and destination address will be checked in the similar way. If not matched, the packet on the backward path will be regarded as illegal and thus dropped.</t>

<t>An SR-aware firewall is able to retrieve the final destination of an SRv6 packet from the last entry in the SRH. The &lt;source, destination&gt; tuple of the packet from PE1 to PE2 is &lt;PE1-IP-ADDR, PE2-VPN-SID&gt;, and the other direction is &lt;PE2-IP-ADDR, PE1-VPN-SID&gt;. However, the source address of the outer IPv6 packet is usually a loopback interface of the ingress PE. Eventually, the source address and destination address of the forward and backward VPN traffic are regarded as different flow, and they may be blocked by the firewall.</t>

</section>
<section anchor="solution-for-srv6-traffic-pass-thru-sr-aware-stateful-firewall"><name>Solution for SRv6 Traffic Pass Thru SR-aware Stateful Firewall</name>

<t>In the SRv6-based VPN service, the final destination of the outer IPv6 header is the VPN-SID of the egress PE, which is associated with that VPN service. But the source address of the outer IPv6 header is usually unrelated to the VPN service. So, it can be difficult for a stateful firewall to establish the association relationship between the bidirectional traffic flows.</t>

<t>The proposed solution is to unify the semantic of the source and destination address thus ensure the symmetry of the bidirectional flow.</t>

<t>When an ingress PE receives the client packet from CE, it checks which L3 VPN service it belongs to, and uses the VPN-SID associated with that L3 VPN service as the source address when encapsulating the outer IPv6 header with the optional SRH.</t>

<figure align="center" anchor="f6" title="Outer IPv6 Header in the Proposed Solution"><artwork type="ascii-art"><![CDATA[
Outer IPv6 Header of SR-Policy-based VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=NextSegment     *        * DA=NextSegment     *
**********************        **********************
*        SRH         *        *        SRH         *
* Seg[0]=PE2-VPN-SID *        * Seg[0]=PE1-VPN-SID *
* Seg[...]           *        * Seg[...]           *
**********************        **********************

Outer IPv6 Header of Best-effort VPN Traffic:

**********************        **********************
*        IPv6        *        *        IPv6        *
* SA=PE1-VPN-SID     *        * SA=PE2-VPN-SID     *
* DA=PE2-VPN-SID     *        * DA=PE1-VPN-SID     *
**********************        **********************

]]></artwork></figure>

<t>According to <xref target="RFC8402"></xref> and <xref target="RFC8986"></xref>, an SRv6 VPN Service SID is an IPv6 address, and it is routable by its Locator prefix in the SRv6 network. In the proposed solution, when an SRv6 VPN Service SID is used as the source address of the outer IPv6 header in the SRv6 network, it is treated as a normal IPv6 address and does not perform any special behavior.</t>

</section>
</section>
</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>TBD.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>
<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>
<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>
<reference anchor="RFC4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="RFC9252">
  <front>
    <title>BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)</title>
    <author fullname="G. Dawra" initials="G." role="editor" surname="Dawra"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Zhuang" initials="S." surname="Zhuang"/>
    <author fullname="J. Rabadan" initials="J." surname="Rabadan"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>This document defines procedures and messages for SRv6-based BGP services, including Layer 3 Virtual Private Network (L3VPN), Ethernet VPN (EVPN), and Internet services. It builds on "BGP/MPLS IP Virtual Private Networks (VPNs)" (RFC 4364) and "BGP MPLS-Based Ethernet VPN" (RFC 7432).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9252"/>
  <seriesInfo name="DOI" value="10.17487/RFC9252"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC5920">
  <front>
    <title>Security Framework for MPLS and GMPLS Networks</title>
    <author fullname="L. Fang" initials="L." role="editor" surname="Fang"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document provides a security framework for Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) Networks. This document addresses the security aspects that are relevant in the context of MPLS and GMPLS. It describes the security threats, the related defensive techniques, and the mechanisms for detection and reporting. This document emphasizes RSVP-TE and LDP security considerations, as well as inter-AS and inter-provider security considerations for building and maintaining MPLS and GMPLS networks across different domains or different Service Providers. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5920"/>
  <seriesInfo name="DOI" value="10.17487/RFC5920"/>
</reference>

<reference anchor="I-D.draft-ietf-spring-sr-service-programming">
   <front>
      <title>Service Programming with Segment Routing</title>
      <author fullname="Ahmed Abdelsalam" initials="A." surname="Abdelsalam">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Xiaohu Xu" initials="X." surname="Xu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname="Daniel Bernier" initials="D." surname="Bernier">
         <organization>Bell Canada</organization>
      </author>
      <author fullname="Cheng Li" initials="C." surname="Li">
         <organization>Huawei</organization>
      </author>
      <author fullname="Bruno Decraene" initials="B." surname="Decraene">
         <organization>Orange</organization>
      </author>
      <author fullname="Shaowen Ma" initials="S." surname="Ma">
         <organization>Mellanox</organization>
      </author>
      <author fullname="Chaitanya Yadlapalli" initials="C." surname="Yadlapalli">
         <organization>AT&amp;T</organization>
      </author>
      <author fullname="Wim Henderickx" initials="W." surname="Henderickx">
         <organization>Nokia</organization>
      </author>
      <author fullname="Stefano Salsano" initials="S." surname="Salsano">
         <organization>Universita di Roma &quot;Tor Vergata&quot;</organization>
      </author>
      <date day="3" month="November" year="2025"/>
      <abstract>
	 <t>   This document defines data plane functionality required to implement
   service segments and achieve service programming in SR-enabled MPLS
   and IPv6 networks, as described in the Segment Routing architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-sr-service-programming-12"/>
   
</reference>

<reference anchor="I-D.draft-ietf-spring-srv6-security">
   <front>
      <title>Segment Routing IPv6 Security Considerations</title>
      <author fullname="Nick Buraglio" initials="N." surname="Buraglio">
         <organization>Energy Sciences Network</organization>
      </author>
      <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
         <organization>Huawei</organization>
      </author>
      <author fullname="tongtian124" initials="" surname="tongtian124">
         <organization>China Unicom</organization>
      </author>
      <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
         <organization>Telefonica</organization>
      </author>
      <author fullname="Fernando Gont" initials="F." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <date day="2" month="February" year="2026"/>
      <abstract>
	 <t>   SRv6 is a traffic engineering, encapsulation and steering mechanism
   utilizing IPv6 addresses to identify segments in a pre-defined
   policy.  This document discusses security considerations in SRv6
   networks, including the potential threats and the possible mitigation
   methods.  The document does not define any new security protocols or
   extensions to existing protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spring-srv6-security-11"/>
   
</reference>



    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

