diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9125.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9125.txt')
-rw-r--r-- | doc/rfc/rfc9125.txt | 619 |
1 files changed, 619 insertions, 0 deletions
diff --git a/doc/rfc/rfc9125.txt b/doc/rfc/rfc9125.txt new file mode 100644 index 0000000..71bd0e6 --- /dev/null +++ b/doc/rfc/rfc9125.txt @@ -0,0 +1,619 @@ + + + + +Internet Engineering Task Force (IETF) A. Farrel +Request for Comments: 9125 Old Dog Consulting +Category: Standards Track J. Drake +ISSN: 2070-1721 E. Rosen + Juniper Networks + K. Patel + Arrcus, Inc. + L. Jalil + Verizon + August 2021 + + +Gateway Auto-Discovery and Route Advertisement for Site Interconnection + Using Segment Routing + +Abstract + + Data centers are attached to the Internet or a backbone network by + gateway routers. One data center typically has more than one gateway + for commercial, load-balancing, and resiliency reasons. Other sites, + such as access networks, also need to be connected across backbone + networks through gateways. + + This document defines a mechanism using the BGP Tunnel Encapsulation + attribute to allow data center gateway routers to advertise routes to + the prefixes reachable in the site, including advertising them on + behalf of other gateways at the same site. This allows segment + routing to be used to identify multiple paths across the Internet or + backbone network between different gateways. The paths can be + selected for load-balancing, resilience, and quality purposes. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9125. + +Copyright Notice + + Copyright (c) 2021 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Requirements Language + 3. Site Gateway Auto-Discovery + 4. Relationship to BGP - Link State and Egress Peer Engineering + 5. Advertising a Site Route Externally + 6. Encapsulation + 7. IANA Considerations + 8. Security Considerations + 9. Manageability Considerations + 9.1. Relationship to Route Target Constraint + 10. References + 10.1. Normative References + 10.2. Informative References + Acknowledgements + Authors' Addresses + +1. Introduction + + Data centers (DCs) are critical components of the infrastructure used + by network operators to provide services to their customers. DCs + (sites) are interconnected by a backbone network, which consists of + any number of private networks and/or the Internet. DCs are attached + to the backbone network by routers that are gateways (GWs). One DC + typically has more than one GW for various reasons including + commercial preferences, load balancing, or resiliency against + connection or device failure. + + Segment Routing (SR) ([RFC8402]) is a protocol mechanism that can be + used within a DC as well as for steering traffic that flows between + two DC sites. In order for a source site (also known as an ingress + site) that uses SR to load-balance the flows it sends to a + destination site (also known as an egress site), it needs to know the + complete set of entry nodes (i.e., GWs) for that egress DC from the + backbone network connecting the two DCs. Note that it is assumed + that the connected set of DC sites and the border nodes in the + backbone network on the paths that connect the DC sites are part of + the same SR BGP - Link State (LS) instance (see [RFC7752] and + [RFC9086]) so that traffic engineering using SR may be used for these + flows. + + Other sites, such as access networks, also need to be connected + across backbone networks through gateways. For illustrative + purposes, consider the ingress and egress sites shown in Figure 1 as + separate Autonomous Systems (ASes) (noting that the sites could be + implemented as part of the ASes to which they are attached, or as + separate ASes). The various ASes that provide connectivity between + the ingress and egress sites could each be constructed differently + and use different technologies such as IP; MPLS using global table + routing information from BGP; MPLS IP VPN; SR-MPLS IP VPN; or SRv6 IP + VPN. That is, the ingress and egress sites can be connected by + tunnels across a variety of technologies. This document describes + how SR Segment Identifiers (SIDs) are used to identify the paths + between the ingress and egress sites. + + The solution described in this document is agnostic as to whether the + transit ASes do or do not have SR capabilities. The solution uses SR + to stitch together path segments between GWs and through the + Autonomous System Border Routers (ASBRs). Thus, there is a + requirement that the GWs and ASBRs are SR capable. The solution + supports the SR path being extended into the ingress and egress sites + if they are SR capable. + + The solution defined in this document can be seen in the broader + context of site interconnection in [SR-INTERCONNECT]. That document + shows how other existing protocol elements may be combined with the + solution defined in this document to provide a full system, but it is + not a necessary reference for understanding this document. + + Suppose that there are two gateways, GW1 and GW2 as shown in + Figure 1, for a given egress site and that they each advertise a + route to prefix X, which is located within the egress site with each + setting itself as next hop. One might think that the GWs for X could + be inferred from the routes' next-hop fields, but typically it is not + the case that both routes get distributed across the backbone: rather + only the best route, as selected by BGP, is distributed. This + precludes load-balancing flows across both GWs. + + ----------------- --------------------- + | Ingress | | Egress ------ | + | Site | | Site |Prefix| | + | | | | X | | + | | | ------ | + | -- | | --- --- | + | |GW| | | |GW1| |GW2| | + -------++-------- ----+-----------+-+-- + | \ | / | + | \ | / | + | -+------------- --------+--------+-- | + | ||ASBR| ----| |---- |ASBR| |ASBR| | | + | | ---- |ASBR+------+ASBR| ---- ---- | | + | | ----| |---- | | + | | | | | | + | | ----| |---- | | + | | AS1 |ASBR+------+ASBR| AS2 | | + | | ----| |---- | | + | --------------- -------------------- | + --+-----------------------------------------------+-- + | |ASBR| |ASBR| | + | ---- AS3 ---- | + | | + ----------------------------------------------------- + + Figure 1: Example Site Interconnection + + The obvious solution to this problem is to use the BGP feature that + allows the advertisement of multiple paths in BGP (known as Add- + Paths) ([RFC7911]) to ensure that all routes to X get advertised by + BGP. However, even if this is done, the identity of the GWs will be + lost as soon as the routes get distributed through an ASBR that will + set itself to be the next hop. And if there are multiple ASes in the + backbone, not only will the next hop change several times, but the + Add-Paths technique will experience scaling issues. This all means + that the Add-Paths approach is effectively limited to sites connected + over a single AS. + + This document defines a solution that overcomes this limitation and + works equally well with a backbone constructed from one or more ASes + using the Tunnel Encapsulation attribute ([RFC9012]) as follows: + + When a GW to a given site advertises a route to a prefix X within + that site, it will include a Tunnel Encapsulation attribute that + contains the union of the Tunnel Encapsulation attributes + advertised by each of the GWs to that site, including itself. + + In other words, each route advertised by a GW identifies all of the + GWs to the same site (see Section 3 for a discussion of how GWs + discover each other), i.e., the Tunnel Encapsulation attribute + advertised by each GW contains multiple Tunnel TLVs, one or more from + each active GW, and each Tunnel TLV will contain a Tunnel Egress + Endpoint sub-TLV that identifies the GW for that Tunnel TLV. + Therefore, even if only one of the routes is distributed to other + ASes, it will not matter how many times the next hop changes, as the + Tunnel Encapsulation attribute will remain unchanged. + + To put this in the context of Figure 1, GW1 and GW2 discover each + other as gateways for the egress site. Both GW1 and GW2 advertise + themselves as having routes to prefix X. Furthermore, GW1 includes a + Tunnel Encapsulation attribute, which is the union of its Tunnel + Encapsulation attribute and GW2's Tunnel Encapsulation attribute. + Similarly, GW2 includes a Tunnel Encapsulation attribute, which is + the union of its Tunnel Encapsulation attribute and GW1's Tunnel + Encapsulation attribute. The gateway in the ingress site can now see + all possible paths to X in the egress site regardless of which route + is propagated to it, and it can choose one or balance traffic flows + as it sees fit. + +2. Requirements Language + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + +3. Site Gateway Auto-Discovery + + To allow a given site's GWs to auto-discover each other and to + coordinate their operations, the following procedures are + implemented: + + * A route target ([RFC4360]) MUST be attached to each GW's auto- + discovery route (defined below), and its value MUST be set to a + value that indicates the site identifier. The rules for + constructing a route target are detailed in [RFC4360]. It is + RECOMMENDED that a Type x00 or x02 route target be used. + + * Site identifiers are set through configuration. The site + identifiers MUST be the same across all GWs to the site (i.e., the + same identifier is used by all GWs to the same site) and MUST be + unique across all sites that are connected (i.e., across all GWs + to all sites that are interconnected). + + * Each GW MUST construct an import filtering rule to import any + route that carries a route target with the same site identifier + that the GW itself uses. This means that only these GWs will + import those routes, and that all GWs to the same site will import + each other's routes and will learn (auto-discover) the current set + of active GWs for the site. + + The auto-discovery route that each GW advertises consists of the + following: + + * IPv4 or IPv6 Network Layer Reachability Information (NLRI) + ([RFC4760]) containing one of the GW's loopback addresses (that + is, with an AFI/SAFI pair that is one of the following: IPv4/NLRI + used for unicast forwarding (1/1); IPv6/NLRI used for unicast + forwarding (2/1); IPv4/NLRI with MPLS Labels (1/4); or IPv6/NLRI + with MPLS Labels (2/4)). + + * A Tunnel Encapsulation attribute ([RFC9012]) containing the GW's + encapsulation information encoded in one or more Tunnel TLVs. + + To avoid the side effect of applying the Tunnel Encapsulation + attribute to any packet that is addressed to the GW itself, the + address advertised for auto-discovery MUST be a different loopback + address than is advertised for packets directed to the gateway + itself. + + As described in Section 1, each GW will include a Tunnel + Encapsulation attribute with the GW encapsulation information for + each of the site's active GWs (including itself) in every route + advertised externally to that site. As the current set of active GWs + changes (due to the addition of a new GW or the failure/removal of an + existing GW), each externally advertised route will be re-advertised + with a new Tunnel Encapsulation attribute, which reflects the current + set of active GWs. + + If a gateway becomes disconnected from the backbone network, or if + the site operator decides to terminate the gateway's activity, it + MUST withdraw the advertisements described above. This means that + remote gateways at other sites will stop seeing advertisements from + or about this gateway. Note that if the routing within a site is + broken (for example, such that there is a route from one GW to + another but not in the reverse direction), then it is possible that + incoming traffic will be routed to the wrong GW to reach the + destination prefix; in this degraded network situation, traffic may + be dropped. + + Note that if a GW is (mis)configured with a different site identifier + from the other GWs to the same site, then it will not be auto- + discovered by the other GWs (and will not auto-discover the other + GWs). This would result in a GW for another site receiving only the + Tunnel Encapsulation attribute included in the BGP best route, i.e., + the Tunnel Encapsulation attribute of the (mis)configured GW or that + of the other GWs. + +4. Relationship to BGP - Link State and Egress Peer Engineering + + When a remote GW receives a route to a prefix X, it uses the Tunnel + Egress Endpoint sub-TLVs in the containing Tunnel Encapsulation + attribute to identify the GWs through which X can be reached. It + uses this information to compute SR Traffic Engineering (SR TE) paths + across the backbone network looking at the information advertised to + it in SR BGP - Link State (BGP-LS) ([RFC9085]) and correlated using + the site identity. SR Egress Peer Engineering (EPE) ([RFC9086]) can + be used to supplement the information advertised in BGP-LS. + +5. Advertising a Site Route Externally + + When a packet destined for prefix X is sent on an SR TE path to a GW + for the site containing X (that is, the packet is sent in the ingress + site on an SR TE path that describes the whole path including those + parts that are within the egress site), it needs to carry the + receiving GW's SID for X such that this SID becomes the next SID that + is due to be processed before the GW completes its processing of the + packet. To achieve this, each Tunnel TLV in the Tunnel Encapsulation + attribute contains a Prefix-SID sub-TLV ([RFC9012]) for X. + + As defined in [RFC9012], the Prefix-SID sub-TLV is only for IPv4/IPV6 + Labeled Unicast routes, so the solution described in this document + only applies to routes of those types. If the use of the Prefix-SID + sub-TLV for routes of other types is defined in the future, further + documents will be needed to describe their use for site + interconnection consistent with this document. + + Alternatively, if MPLS SR is in use and if the GWs for a given egress + site are configured to allow GWs at remote ingress sites to perform + SR TE through that egress site for a prefix X, then each GW to the + egress site computes an SR TE path through the egress site to X and + places each in an MPLS Label Stack sub-TLV ([RFC9012]) in the SR + Tunnel TLV for that GW. + + Please refer to Section 7 of [SR-INTERCONNECT] for worked examples of + how the SID stack is constructed in this case and how the + advertisements would work. + +6. Encapsulation + + If a site is configured to allow remote GWs to send packets to the + site in the site's native encapsulation, then each GW to the site + will also include multiple instances of a Tunnel TLV for that native + encapsulation in externally advertised routes: one for each GW. Each + Tunnel TLV contains a Tunnel Egress Endpoint sub-TLV with the address + of the GW that the Tunnel TLV identifies. A remote GW may then + encapsulate a packet according to the rules defined via the sub-TLVs + included in each of the Tunnel TLVs. + +7. IANA Considerations + + IANA maintains the "BGP Tunnel Encapsulation Attribute Tunnel Types" + registry in the "Border Gateway Protocol (BGP) Tunnel Encapsulation" + registry. + + IANA had previously assigned the value 17 from this subregistry for + "SR Tunnel", referencing this document as an Internet-Draft. At that + time, the assignment policy for this range of the registry was "First + Come First Served" [RFC8126]. + + IANA has marked that assignment as deprecated. IANA may reclaim that + codepoint at such a time that the registry is depleted. + +8. Security Considerations + + From a protocol point of view, the mechanisms described in this + document can leverage the security mechanisms already defined for + BGP. Further discussion of security considerations for BGP may be + found in the BGP specification itself ([RFC4271]) and in the security + analysis for BGP ([RFC4272]). The original discussion of the use of + the TCP MD5 signature option to protect BGP sessions is found in + [RFC5925], while [RFC6952] includes an analysis of BGP keying and + authentication issues. + + The mechanisms described in this document involve sharing routing or + reachability information between sites, which may mean disclosing + information that is normally contained within a site. So it needs to + be understood that normal security paradigms based on the boundaries + of sites are weakened and interception of BGP messages may result in + information being disclosed to third parties. Discussion of these + issues with respect to VPNs can be found in [RFC4364], while + [RFC7926] describes many of the issues associated with the exchange + of topology or TE information between sites. + + Particular exposures resulting from this work include: + + * Gateways to a site will know about all other gateways to the same + site. This feature applies within a site, so it is not a + substantial exposure, but it does mean that if the BGP exchanges + within a site can be snooped or if a gateway can be subverted, + then an attacker may learn the full set of gateways to a site. + This would facilitate more effective attacks on that site. + + * The existence of multiple gateways to a site becomes more visible + across the backbone and even into remote sites. This means that + an attacker is able to prepare a more comprehensive attack than + exists when only the locally attached backbone network (e.g., the + AS that hosts the site) can see all of the gateways to a site. + For example, a Denial-of-Service attack on a single GW is + mitigated by the existence of other GWs, but if the attacker knows + about all the gateways, then the whole set can be attacked at + once. + + * A node in a site that does not have external BGP peering (i.e., is + not really a site gateway and cannot speak BGP into the backbone + network) may be able to get itself advertised as a gateway by + letting other genuine gateways discover it (by speaking BGP to + them within the site), so it may get those genuine gateways to + advertise it as a gateway into the backbone network. This would + allow the malicious node to attract traffic without having to have + secure BGP peerings with out-of-site nodes. + + * An external party intercepting BGP messages anywhere between sites + may learn information about the functioning of the sites and the + locations of endpoints. While this is not necessarily a + significant security or privacy risk, it is possible that the + disclosure of this information could be used by an attacker. + + * If it is possible to modify a BGP message within the backbone, it + may be possible to spoof the existence of a gateway. This could + cause traffic to be attracted to a specific node and might result + in traffic not being delivered. + + All of the issues in the list above could cause disruption to site + interconnection, but they are not new protocol vulnerabilities so + much as new exposures of information that SHOULD be protected against + using existing protocol mechanisms such as securing the TCP sessions + over which the BGP messages flow. Furthermore, it is a general + observation that if these attacks are possible, then it is highly + likely that far more significant attacks can be made on the routing + system. It should be noted that BGP peerings are not discovered but + always arise from explicit configuration. + + Given that the gateways and ASBRs are connected by tunnels that may + run across parts of the network that are not trusted, data center + operators using the approach set out in this network MUST consider + using gateway-to-gateway encryption to protect the data center + traffic. Additionally, due consideration MUST be given to encrypting + end-to-end traffic as it would be for any traffic that uses a public + or untrusted network for transport. + +9. Manageability Considerations + + The principal configuration item added by this solution is the + allocation of a site identifier. The same identifier MUST be + assigned to every GW to the same site, and each site MUST have a + different identifier. This requires coordination, probably through a + central management agent. + + It should be noted that BGP peerings are not discovered but always + arise from explicit configuration. This is no different from any + other BGP operation. + + The site identifiers that are configured and carried in route targets + (see Section 3) are an important feature to ensure that all of the + gateways to a site discover each other. Therefore, it is important + that this value is not misconfigured since that would result in the + gateways not discovering each other and not advertising each other. + +9.1. Relationship to Route Target Constraint + + In order to limit the VPN routing information that is maintained at a + given route reflector, [RFC4364] suggests that route reflectors use + "Cooperative Route Filtering", which was renamed "Outbound Route + Filtering" and defined in [RFC5291]. [RFC4684] defines an extension + to that mechanism to include support for multiple autonomous systems + and asymmetric VPN topologies such as hub-and-spoke. The mechanism + in RFC 4684 is known as Route Target Constraint (RTC). + + An operator would not normally configure RTC by default for any AFI/ + SAFI combination and would only enable it after careful + consideration. When using the mechanisms defined in this document, + the operator should carefully consider the effects of filtering + routes. In some cases, this may be desirable, and in others, it + could limit the effectiveness of the procedures. + +10. References + +10.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A + Border Gateway Protocol 4 (BGP-4)", RFC 4271, + DOI 10.17487/RFC4271, January 2006, + <https://www.rfc-editor.org/info/rfc4271>. + + [RFC4360] Sangli, S., Tappan, D., and Y. Rekhter, "BGP Extended + Communities Attribute", RFC 4360, DOI 10.17487/RFC4360, + February 2006, <https://www.rfc-editor.org/info/rfc4360>. + + [RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter, + "Multiprotocol Extensions for BGP-4", RFC 4760, + DOI 10.17487/RFC4760, January 2007, + <https://www.rfc-editor.org/info/rfc4760>. + + [RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP + Authentication Option", RFC 5925, DOI 10.17487/RFC5925, + June 2010, <https://www.rfc-editor.org/info/rfc5925>. + + [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and + S. Ray, "North-Bound Distribution of Link-State and + Traffic Engineering (TE) Information Using BGP", RFC 7752, + DOI 10.17487/RFC7752, March 2016, + <https://www.rfc-editor.org/info/rfc7752>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [RFC9012] Patel, K., Van de Velde, G., Sangli, S., and J. Scudder, + "The BGP Tunnel Encapsulation Attribute", RFC 9012, + DOI 10.17487/RFC9012, April 2021, + <https://www.rfc-editor.org/info/rfc9012>. + +10.2. Informative References + + [RFC4272] Murphy, S., "BGP Security Vulnerabilities Analysis", + RFC 4272, DOI 10.17487/RFC4272, January 2006, + <https://www.rfc-editor.org/info/rfc4272>. + + [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private + Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February + 2006, <https://www.rfc-editor.org/info/rfc4364>. + + [RFC4684] Marques, P., Bonica, R., Fang, L., Martini, L., Raszuk, + R., Patel, K., and J. Guichard, "Constrained Route + Distribution for Border Gateway Protocol/MultiProtocol + Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual + Private Networks (VPNs)", RFC 4684, DOI 10.17487/RFC4684, + November 2006, <https://www.rfc-editor.org/info/rfc4684>. + + [RFC5291] Chen, E. and Y. Rekhter, "Outbound Route Filtering + Capability for BGP-4", RFC 5291, DOI 10.17487/RFC5291, + August 2008, <https://www.rfc-editor.org/info/rfc5291>. + + [RFC6952] Jethanandani, M., Patel, K., and L. Zheng, "Analysis of + BGP, LDP, PCEP, and MSDP Issues According to the Keying + and Authentication for Routing Protocols (KARP) Design + Guide", RFC 6952, DOI 10.17487/RFC6952, May 2013, + <https://www.rfc-editor.org/info/rfc6952>. + + [RFC7911] Walton, D., Retana, A., Chen, E., and J. Scudder, + "Advertisement of Multiple Paths in BGP", RFC 7911, + DOI 10.17487/RFC7911, July 2016, + <https://www.rfc-editor.org/info/rfc7911>. + + [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., + Ceccarelli, D., and X. Zhang, "Problem Statement and + Architecture for Information Exchange between + Interconnected Traffic-Engineered Networks", BCP 206, + RFC 7926, DOI 10.17487/RFC7926, July 2016, + <https://www.rfc-editor.org/info/rfc7926>. + + [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for + Writing an IANA Considerations Section in RFCs", BCP 26, + RFC 8126, DOI 10.17487/RFC8126, June 2017, + <https://www.rfc-editor.org/info/rfc8126>. + + [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L., + Decraene, B., Litkowski, S., and R. Shakir, "Segment + Routing Architecture", RFC 8402, DOI 10.17487/RFC8402, + July 2018, <https://www.rfc-editor.org/info/rfc8402>. + + [RFC9085] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Gredler, + H., and M. Chen, "Border Gateway Protocol - Link State + (BGP-LS) Extensions for Segment Routing", RFC 9085, + DOI 10.17487/RFC9085, August 2021, + <https://www.rfc-editor.org/info/rfc9085>. + + [RFC9086] Previdi, S., Talaulikar, K., Ed., Filsfils, C., Patel, K., + Ray, S., and J. Dong, "Border Gateway Protocol - Link + State (BGP-LS) Extensions for Segment Routing BGP Egress + Peer Engineering", RFC 9086, DOI 10.17487/RFC9086, August + 2021, <https://www.rfc-editor.org/info/rfc9086>. + + [SR-INTERCONNECT] + Farrel, A. and J. Drake, "Interconnection of Segment + Routing Sites - Problem Statement and Solution Landscape", + Work in Progress, Internet-Draft, draft-farrel-spring-sr- + domain-interconnect-06, 19 May 2021, + <https://datatracker.ietf.org/doc/html/draft-farrel- + spring-sr-domain-interconnect-06>. + +Acknowledgements + + Thanks to Bruno Rijsman, Stephane Litkowski, Boris Hassanov, Linda + Dunbar, Ravi Singh, and Daniel Migault for review comments, and to + Robert Raszuk for useful discussions. Gyan Mishra provided a helpful + GenArt review, and John Scudder and Benjamin Kaduk made helpful + comments during IESG review. + +Authors' Addresses + + Adrian Farrel + Old Dog Consulting + + Email: adrian@olddog.co.uk + + + John Drake + Juniper Networks + + Email: jdrake@juniper.net + + + Eric Rosen + Juniper Networks + + Email: erosen52@gmail.com + + + Keyur Patel + Arrcus, Inc. + + Email: keyur@arrcus.com + + + Luay Jalil + Verizon + + Email: luay.jalil@verizon.com |