< draft-ietf-rtgwg-srv6-egress-protection-04.txt   draft-ietf-rtgwg-srv6-egress-protection-05.txt >
Network Working Group Z. Hu Network Working Group Z. Hu
Internet-Draft Huawei Internet-Draft Huawei
Intended status: Standards Track H. Chen Intended status: Standards Track H. Chen
Expires: 20 April 2022 Futurewei Expires: October 20, 2022 Futurewei
H. Chen H. Chen
China Telecom China Telecom
P. Wu P. Wu
Huawei Huawei
M. Toy M. Toy
Verizon Verizon
C. Cao C. Cao
T. He T. He
China Unicom China Unicom
L. Liu L. Liu
Fujitsu Fujitsu
X. Liu X. Liu
Volta Networks Volta Networks
17 October 2021 April 18, 2022
SRv6 Path Egress Protection SRv6 Path Egress Protection
draft-ietf-rtgwg-srv6-egress-protection-04 draft-ietf-rtgwg-srv6-egress-protection-05
Abstract Abstract
This document describes protocol extensions for protecting the egress This document describes protocol extensions for protecting the egress
node of a Segment Routing for IPv6 (SRv6) path or tunnel. node of a Segment Routing for IPv6 (SRv6) path or tunnel.
Requirements Language Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
skipping to change at page 2, line 9 skipping to change at page 2, line 4
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 20, 2022.
This Internet-Draft will expire on 20 April 2022.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents
license-info) in effect on the date of publication of this document. (https://trustee.ietf.org/license-info) in effect on the date of
Please review these documents carefully, as they describe your rights publication of this document. Please review these documents
and restrictions with respect to this document. Code Components carefully, as they describe your rights and restrictions with respect
extracted from this document must include Simplified BSD License text to this document. Code Components extracted from this document must
as described in Section 4.e of the Trust Legal Provisions and are include Simplified BSD License text as described in Section 4.e of
provided without warranty as described in the Simplified BSD License. the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminologies . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminologies . . . . . . . . . . . . . . . . . . . . . . . . 3
3. SR Path Egress Protection . . . . . . . . . . . . . . . . . . 4 3. SR Path Egress Protection . . . . . . . . . . . . . . . . . . 4
3.1. Mechanism . . . . . . . . . . . . . . . . . . . . . . . . 4 3.1. Mechanism . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2. Example . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2. Example . . . . . . . . . . . . . . . . . . . . . . . . . 6
4. Extensions to IGP for Egress Protection . . . . . . . . . . . 9 4. Extensions to IGP for Egress Protection . . . . . . . . . . . 8
4.1. Extensions to IS-IS . . . . . . . . . . . . . . . . . . . 9 4.1. Extensions to IS-IS . . . . . . . . . . . . . . . . . . . 9
4.2. Extensions to OSPF . . . . . . . . . . . . . . . . . . . 11 4.2. Extensions to OSPF . . . . . . . . . . . . . . . . . . . 11
5. Security Considerations . . . . . . . . . . . . . . . . . . . 14 5. Security Considerations . . . . . . . . . . . . . . . . . . . 13
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
6.1. SRv6 Endpoint Behaviors . . . . . . . . . . . . . . . . . 14 6.1. SRv6 Endpoint Behaviors . . . . . . . . . . . . . . . . . 13
6.2. IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . 14 6.2. IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . 14
6.3. OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . 15 6.3. OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . . . 14
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
8.1. Normative References . . . . . . . . . . . . . . . . . . 15 8.1. Normative References . . . . . . . . . . . . . . . . . . 15
8.2. Informative References . . . . . . . . . . . . . . . . . 17 8.2. Informative References . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17
1. Introduction 1. Introduction
The fast protection of a transit node of a Segment Routing (SR) path The fast protection of a transit node of a Segment Routing (SR) path
or tunnel is described in [I-D.ietf-rtgwg-segment-routing-ti-lfa] and or tunnel is described in [I-D.ietf-rtgwg-segment-routing-ti-lfa] and
[I-D.hu-spring-segment-routing-proxy-forwarding]. [RFC8400] [I-D.hu-spring-segment-routing-proxy-forwarding]. [RFC8400]
specifies the fast protection of egress node(s) of an MPLS TE LSP specifies the fast protection of egress node(s) of an MPLS TE LSP
tunnel including P2P TE LSP tunnel and P2MP TE LSP tunnel in details. tunnel including P2P TE LSP tunnel and P2MP TE LSP tunnel in details.
However, these documents do not discuss the fast protection of the However, these documents do not discuss the fast protection of the
skipping to change at page 5, line 15 skipping to change at page 4, line 44
******* ******* SIDa ******* ******* SIDa
[PE1]-----[P1]-----[PEA]---[CE2] PEA Egress [PE1]-----[P1]-----[PEA]---[CE2] PEA Egress
/ | |& | \ / PEB Backup Egress / | |& | \ / PEB Backup Egress
/ | |& | \ / CEx Customer Edge / | |& | \ / CEx Customer Edge
[CE1] | |& | X Px Non-Provider Edge [CE1] | |& | X Px Non-Provider Edge
\ | |& | / \ *** SR Path \ | |& | / \ *** SR Path
\ | |& &&&&& | / \ &&& Backup Path \ | |& &&&&& | / \ &&& Backup Path
[PE2]-----[P2]-----[PEB]---[CE3] [PE2]-----[P2]-----[PEB]---[CE3]
Mirror SID Mirror SID
Figure 1: PEB Protects Egress PEA of SR Path Figure 1: PEB Protects Egress PEA of SR Path
Where node PEA is the egress of the SR path from PE1 to PEA, and has Where node PEA is the egress of the SR path from PE1 to PEA, and has
SIDa which is the active segment in the packet from the SR path at SIDa which is the active segment in the packet from the SR path at
PEA. Node PEB is the backup egress (or say protector) to provide the PEA. Node PEB is the backup egress (or say protector) to provide the
protection for egress (or say primary egress) PEA. Node P1 is the protection for egress (or say primary egress) PEA. Node P1 is the
direct previous hop of egress PEA and acts as PLR to support the direct previous hop of egress PEA and acts as PLR to support the
protection for PEA. protection for PEA.
When PEB is selected as a backup egress to protect the egress PEA, a When PEB is selected as a backup egress to protect the egress PEA, a
Mirror SID (refer to Section 5.1 of [RFC8402]) is configured on PEB Mirror SID (refer to Section 5.1 of [RFC8402]) is configured on PEB
skipping to change at page 7, line 32 skipping to change at page 7, line 18
/ | |& | \ / PE4 Backup Egress / | |& | \ / PE4 Backup Egress
/ | |& | \ / CEx Customer Edge / | |& | \ / CEx Customer Edge
[CE1] | |& | X Px Non-Provider Edge [CE1] | |& | X Px Non-Provider Edge
\ | |& | / \ *** SR Path \ | |& | / \ *** SR Path
\ | |& &&&&& | / \ &&& Backup Path \ | |& &&&&& | / \ &&& Backup Path
[PE2]-----[P2]-----[PE4]---[CE3] [PE2]-----[P2]-----[PE4]---[CE3]
Locator: A4:1::/64 Locator: A4:1::/64
VPN SID: A4:1::B100 VPN SID: A4:1::B100
Mirror SID: A4:1::3, protect A3:1::/64 Mirror SID: A4:1::3, protect A3:1::/64
Figure 2: PE4 Protects Egress PE3 of SR Path Figure 2: PE4 Protects Egress PE3 of SR Path
Where node P1's pre-computed backup path for PE3 is from P1 to PE4 Where node P1's pre-computed backup path for PE3 is from P1 to PE4
via P2. In normal operations, after receiving a packet with via P2. In normal operations, after receiving a packet with
destination PE3, P1 forwards the packet to PE3 according to its FIB. destination PE3, P1 forwards the packet to PE3 according to its FIB.
When PE3 receives the packet, it sends the packet to CE2. When PE3 receives the packet, it sends the packet to CE2.
When PE3 fails, P1 as PLR detects the failure through using a failure When PE3 fails, P1 as PLR detects the failure through using a failure
detection mechanism such as BFD and forwards the packet to PE4 via detection mechanism such as BFD and forwards the packet to PE4 via
the backup path. When PE4 receives the packet, it sends the packet the backup path. When PE4 receives the packet, it sends the packet
to the same CE2. to the same CE2.
skipping to change at page 10, line 33 skipping to change at page 10, line 17
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type (TBD2) | Length | | Type (TBD2) | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Locator-Size | Locator (variable) ~ | Locator-Size | Locator (variable) ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Locator-Size | Locator (variable) ~ | Locator-Size | Locator (variable) ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: IS-IS Protected Locators sub-TLV Figure 4: IS-IS Protected Locators sub-TLV
Type: TBD2 (suggested value 1) is to be assigned by IANA. Type: TBD2 (suggested value 1) is to be assigned by IANA.
Length: variable. Length: variable.
Locator-Size: 1 octet. Number of bits (1 - 128) in the Locator Locator-Size: 1 octet. Number of bits (1 - 128) in the Locator
field. field.
Locator: 1-16 octets. This field encodes an SRv6 Locator to be Locator: 1-16 octets. This field encodes an SRv6 Locator to be
protected by the SRv6 mirror SID. The Locator is encoded in the protected by the SRv6 mirror SID. The Locator is encoded in the
skipping to change at page 11, line 17 skipping to change at page 10, line 45
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type (TBD3) | Length | | Type (TBD3) | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SID-Size | SID (variable) ~ | SID-Size | SID (variable) ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SID-Size | SID (variable) ~ | SID-Size | SID (variable) ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 5: IS-IS Protected SIDs sub-TLV Figure 5: IS-IS Protected SIDs sub-TLV
Type: TBD3 (suggested value 2) is to be assigned by IANA. Type: TBD3 (suggested value 2) is to be assigned by IANA.
Length: variable. Length: variable.
SID-Size: 1 octet. Number of bits in the SID field. It is from 1 SID-Size: 1 octet. Number of bits in the SID field. It is from 1
to 128. When it is less than 128, the SID field is a locator. to 128. When it is less than 128, the SID field is a locator.
When it is 128, the SID field is an SRv6 SID. When it is 128, the SID field is an SRv6 SID.
SID: 1-16 octets. This field encodes an SRv6 SID or locator to be SID: 1-16 octets. This field encodes an SRv6 SID or locator to be
skipping to change at page 12, line 20 skipping to change at page 11, line 42
| Flags | SRv6 Endpoint Function | | Flags | SRv6 Endpoint Function |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SID (16 octets) | | SID (16 octets) |
: : : :
| | | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| sub-TLVs | | sub-TLVs |
: : : :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: OSPF SRv6 Mirror SID sub-TLV Figure 6: OSPF SRv6 Mirror SID sub-TLV
Type: TBD4 (suggested value 8) is to be assigned by IANA. Type: TBD4 (suggested value 8) is to be assigned by IANA.
Length: variable. Length: variable.
Flags: 1 octet. No flags are currently defined. Flags: 1 octet. No flags are currently defined.
SRv6 Endpoint Function: 2 octets. It contains the endpoint function SRv6 Endpoint Function: 2 octets. It contains the endpoint function
74 for End.M SID. 74 for End.M SID.
skipping to change at page 14, line 40 skipping to change at page 14, line 20
+==============+=========================+===============+ +==============+=========================+===============+
| Sub-TLV Type | Sub-TLV Name | Reference | | Sub-TLV Type | Sub-TLV Name | Reference |
+==============+=========================+===============+ +==============+=========================+===============+
| 8 | SRv6 Mirror SID Sub-TLV | This document | | 8 | SRv6 Mirror SID Sub-TLV | This document |
+--------------+-------------------------+---------------+ +--------------+-------------------------+---------------+
IANA is requested to create and maintain a new registry for sub-sub- IANA is requested to create and maintain a new registry for sub-sub-
TLVs of the SRv6 Mirror SID Sub-TLV. The suggested registry name is TLVs of the SRv6 Mirror SID Sub-TLV. The suggested registry name is
o Sub-Sub-TLVs for SRv6 Mirror SID Sub-TLV o Sub-Sub-TLVs for SRv6 Mirror SID Sub-TLV
Initial values for the registry are given below. The future Initial values for the registry are given below. The future
assignments are to be made through IETF Review [RFC5226]. assignments are to be made through IETF Review [RFC5226].
Value Sub-Sub-TLV Name Definition Value Sub-Sub-TLV Name Definition
----- ----------------------- ------------- ----- ----------------------- -------------
0 Reserved 0 Reserved
1 Protected Locators Sub-Sub-TLV This Document 1 Protected Locators Sub-Sub-TLV This Document
2 Protected SIDs Sub-Sub-TLV 2 Protected SIDs Sub-Sub-TLV
3-255 Unassigned 3-255 Unassigned
skipping to change at page 15, line 20 skipping to change at page 14, line 47
+==============+=========================+===============+ +==============+=========================+===============+
| Sub-TLV Type | Sub-TLV Name | Reference | | Sub-TLV Type | Sub-TLV Name | Reference |
+==============+=========================+===============+ +==============+=========================+===============+
| 8 | SRv6 Mirror SID Sub-TLV | This document | | 8 | SRv6 Mirror SID Sub-TLV | This document |
+--------------+-------------------------+---------------+ +--------------+-------------------------+---------------+
IANA is requested to create and maintain a new registry for sub-sub- IANA is requested to create and maintain a new registry for sub-sub-
TLVs of the SRv6 Mirror SID Sub-TLV. The suggested registry name is TLVs of the SRv6 Mirror SID Sub-TLV. The suggested registry name is
o Sub-Sub-TLVs for SRv6 Mirror SID Sub-TLV o Sub-Sub-TLVs for SRv6 Mirror SID Sub-TLV
Initial values for the registry are given below. The future Initial values for the registry are given below. The future
assignments are to be made through IETF Review [RFC5226]. assignments are to be made through IETF Review [RFC5226].
Value Sub-Sub-TLV Name Definition Value Sub-Sub-TLV Name Definition
----- ----------------------- ------------- ----- ----------------------- -------------
0 Reserved 0 Reserved
1 Protected Locators Sub-Sub-TLV This Document 1 Protected Locators Sub-Sub-TLV This Document
2 Protected SIDs Sub-Sub-TLV 2 Protected SIDs Sub-Sub-TLV
3-65535 Unassigned 3-65535 Unassigned
skipping to change at page 15, line 45 skipping to change at page 15, line 25
Li, Alexander Vainshtein, Greg Mirsky, Bruno Decraene, Jeff Tantsura, Li, Alexander Vainshtein, Greg Mirsky, Bruno Decraene, Jeff Tantsura,
Chris Bowers and Ketan Talaulikar for their comments to this work. Chris Bowers and Ketan Talaulikar for their comments to this work.
8. References 8. References
8.1. Normative References 8.1. Normative References
[I-D.ietf-lsr-isis-srv6-extensions] [I-D.ietf-lsr-isis-srv6-extensions]
Psenak, P., Filsfils, C., Bashandy, A., Decraene, B., and Psenak, P., Filsfils, C., Bashandy, A., Decraene, B., and
Z. Hu, "IS-IS Extensions to Support Segment Routing over Z. Hu, "IS-IS Extensions to Support Segment Routing over
IPv6 Dataplane", Work in Progress, Internet-Draft, draft- IPv6 Dataplane", draft-ietf-lsr-isis-srv6-extensions-18
ietf-lsr-isis-srv6-extensions-17, 18 June 2021, (work in progress), October 2021.
<https://www.ietf.org/archive/id/draft-ietf-lsr-isis-srv6-
extensions-17.txt>.
[I-D.ietf-lsr-ospfv3-srv6-extensions] [I-D.ietf-lsr-ospfv3-srv6-extensions]
Li, Z., Hu, Z., Cheng, D., Talaulikar, K., and P. Psenak, Li, Z., Hu, Z., Cheng, D., Talaulikar, K., and P. Psenak,
"OSPFv3 Extensions for SRv6", Work in Progress, Internet- "OSPFv3 Extensions for SRv6", draft-ietf-lsr-
Draft, draft-ietf-lsr-ospfv3-srv6-extensions-02, 15 ospfv3-srv6-extensions-03 (work in progress), November
February 2021, <https://www.ietf.org/archive/id/draft- 2021.
ietf-lsr-ospfv3-srv6-extensions-02.txt>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC7356] Ginsberg, L., Previdi, S., and Y. Yang, "IS-IS Flooding [RFC7356] Ginsberg, L., Previdi, S., and Y. Yang, "IS-IS Flooding
Scope Link State PDUs (LSPs)", RFC 7356, Scope Link State PDUs (LSPs)", RFC 7356,
DOI 10.17487/RFC7356, September 2014, DOI 10.17487/RFC7356, September 2014,
<https://www.rfc-editor.org/info/rfc7356>. <https://www.rfc-editor.org/info/rfc7356>.
skipping to change at page 17, line 15 skipping to change at page 16, line 37
[RFC8986] Filsfils, C., Ed., Camarillo, P., Ed., Leddy, J., Voyer, [RFC8986] Filsfils, C., Ed., Camarillo, P., Ed., Leddy, J., Voyer,
D., Matsushima, S., and Z. Li, "Segment Routing over IPv6 D., Matsushima, S., and Z. Li, "Segment Routing over IPv6
(SRv6) Network Programming", RFC 8986, (SRv6) Network Programming", RFC 8986,
DOI 10.17487/RFC8986, February 2021, DOI 10.17487/RFC8986, February 2021,
<https://www.rfc-editor.org/info/rfc8986>. <https://www.rfc-editor.org/info/rfc8986>.
8.2. Informative References 8.2. Informative References
[I-D.hu-spring-segment-routing-proxy-forwarding] [I-D.hu-spring-segment-routing-proxy-forwarding]
Hu, Z., Chen, H., Yao, J., Bowers, C., Yongqing, and Hu, Z., Chen, H., Yao, J., Bowers, C., Yongqing, and
Yisong, "SR-TE Path Midpoint Restoration", Work in Yisong, "SR-TE Path Midpoint Restoration", draft-hu-
Progress, Internet-Draft, draft-hu-spring-segment-routing- spring-segment-routing-proxy-forwarding-19 (work in
proxy-forwarding-14, 29 April 2021, progress), April 2022.
<https://www.ietf.org/archive/id/draft-hu-spring-segment-
routing-proxy-forwarding-14.txt>.
[I-D.ietf-rtgwg-segment-routing-ti-lfa] [I-D.ietf-rtgwg-segment-routing-ti-lfa]
Litkowski, S., Bashandy, A., Filsfils, C., Francois, P., Litkowski, S., Bashandy, A., Filsfils, C., Francois, P.,
Decraene, B., and D. Voyer, "Topology Independent Fast Decraene, B., and D. Voyer, "Topology Independent Fast
Reroute using Segment Routing", Work in Progress, Reroute using Segment Routing", draft-ietf-rtgwg-segment-
Internet-Draft, draft-ietf-rtgwg-segment-routing-ti-lfa- routing-ti-lfa-08 (work in progress), January 2022.
07, 29 June 2021, <https://www.ietf.org/archive/id/draft-
ietf-rtgwg-segment-routing-ti-lfa-07.txt>.
[I-D.ietf-spring-segment-routing-policy] [I-D.ietf-spring-segment-routing-policy]
Filsfils, C., Talaulikar, K., Voyer, D., Bogdanov, A., and Filsfils, C., Talaulikar, K., Voyer, D., Bogdanov, A., and
P. Mattes, "Segment Routing Policy Architecture", Work in P. Mattes, "Segment Routing Policy Architecture", draft-
Progress, Internet-Draft, draft-ietf-spring-segment- ietf-spring-segment-routing-policy-22 (work in progress),
routing-policy-13, 28 May 2021, March 2022.
<https://www.ietf.org/archive/id/draft-ietf-spring-
segment-routing-policy-13.txt>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", RFC 5226, IANA Considerations Section in RFCs", RFC 5226,
DOI 10.17487/RFC5226, May 2008, DOI 10.17487/RFC5226, May 2008,
<https://www.rfc-editor.org/info/rfc5226>. <https://www.rfc-editor.org/info/rfc5226>.
[RFC5462] Andersson, L. and R. Asati, "Multiprotocol Label Switching [RFC5462] Andersson, L. and R. Asati, "Multiprotocol Label Switching
(MPLS) Label Stack Entry: "EXP" Field Renamed to "Traffic (MPLS) Label Stack Entry: "EXP" Field Renamed to "Traffic
Class" Field", RFC 5462, DOI 10.17487/RFC5462, February Class" Field", RFC 5462, DOI 10.17487/RFC5462, February
2009, <https://www.rfc-editor.org/info/rfc5462>. 2009, <https://www.rfc-editor.org/info/rfc5462>.
Authors' Addresses Authors' Addresses
Zhibo Hu Zhibo Hu
Huawei Huawei
Huawei Bld., No.156 Beiqing Rd. Huawei Bld., No.156 Beiqing Rd.
Beijing Beijing 100095
100095
China China
Email: huzhibo@huawei.com Email: huzhibo@huawei.com
Huaimo Chen Huaimo Chen
Futurewei Futurewei
Boston, MA, Boston, MA
United States of America USA
Email: Huaimo.chen@futurewei.com Email: Huaimo.chen@futurewei.com
Huanan Chen Huanan Chen
China Telecom China Telecom
109, West Zhongshan Road, Tianhe District 109, West Zhongshan Road, Tianhe District
Guangzhou Guangzhou 510000
510000
China China
Email: chenhn8.gd@chinatelecom.cn Email: chenhn8.gd@chinatelecom.cn
Peng Wu Peng Wu
Huawei Huawei
Huawei Bld., No.156 Beiqing Rd. Huawei Bld., No.156 Beiqing Rd.
Beijing Beijing 100095
100095
China China
Email: baggio.wupeng@huawei.com Email: baggio.wupeng@huawei.com
Mehmet Toy Mehmet Toy
Verizon Verizon
United States of America USA
Email: mehmet.toy@verizon.com Email: mehmet.toy@verizon.com
Chang Cao Chang Cao
China Unicom China Unicom
Beijing China
Email: caoc15@chinaunicom.cn Email: caoc15@chinaunicom.cn
Tao He Tao He
China Unicom China Unicom
Beijing China
Email: het21@chinaunicom.cn Email: het21@chinaunicom.cn
Lei Liu Lei Liu
Fujitsu Fujitsu
United States of America USA
Email: liulei.kddi@gmail.com Email: liulei.kddi@gmail.com
Xufeng Liu Xufeng Liu
Volta Networks Volta Networks
McLean, VA McLean, VA
United States of America USA
Email: xufeng.liu.ietf@gmail.com Email: xufeng.liu.ietf@gmail.com
 End of changes. 34 change blocks. 
62 lines changed or deleted 52 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/