summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8799.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8799.txt')
-rw-r--r--doc/rfc/rfc8799.txt1356
1 files changed, 1356 insertions, 0 deletions
diff --git a/doc/rfc/rfc8799.txt b/doc/rfc/rfc8799.txt
new file mode 100644
index 0000000..d3b28e8
--- /dev/null
+++ b/doc/rfc/rfc8799.txt
@@ -0,0 +1,1356 @@
+
+
+
+
+Independent Submission B. Carpenter
+Request for Comments: 8799 Univ. of Auckland
+Category: Informational B. Liu
+ISSN: 2070-1721 Huawei Technologies
+ July 2020
+
+
+ Limited Domains and Internet Protocols
+
+Abstract
+
+ There is a noticeable trend towards network behaviors and semantics
+ that are specific to a particular set of requirements applied within
+ a limited region of the Internet. Policies, default parameters, the
+ options supported, the style of network management, and security
+ requirements may vary between such limited regions. This document
+ reviews examples of such limited domains (also known as controlled
+ environments), notes emerging solutions, and includes a related
+ taxonomy. It then briefly discusses the standardization of protocols
+ for limited domains. Finally, it shows the need for a precise
+ definition of "limited domain membership" and for mechanisms to allow
+ nodes to join a domain securely and to find other members, including
+ boundary nodes.
+
+ This document is the product of the research of the authors. It has
+ been produced through discussions and consultation within the IETF
+ but is not the product of IETF consensus.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This is a contribution to the RFC Series, independently of any other
+ RFC stream. The RFC Editor has chosen to publish this document at
+ its discretion and makes no statement about its value for
+ implementation or deployment. Documents approved for publication by
+ the RFC Editor are not candidates for any level of Internet Standard;
+ see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc8799.
+
+Copyright Notice
+
+ Copyright (c) 2020 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Failure Modes in Today's Internet
+ 3. Examples of Limited Domain Requirements
+ 4. Examples of Limited Domain Solutions
+ 5. The Scope of Protocols in Limited Domains
+ 6. Functional Requirements of Limited Domains
+ 7. Security Considerations
+ 8. IANA Considerations
+ 9. Informative References
+ Appendix A. Taxonomy of Limited Domains
+ A.1. Domain as a Whole
+ A.2. Individual Nodes
+ A.3. Domain Boundary
+ A.4. Topology
+ A.5. Technology
+ A.6. Connection to the Internet
+ A.7. Security, Trust, and Privacy Model
+ A.8. Operations
+ A.9. Making Use of This Taxonomy
+ Acknowledgements
+ Contributors
+ Authors' Addresses
+
+1. Introduction
+
+ As the Internet continues to grow and diversify, with a realistic
+ prospect of tens of billions of nodes being connected directly and
+ indirectly, there is a noticeable trend towards network-specific and
+ local requirements, behaviors, and semantics. The word "local"
+ should be understood in a special sense, however. In some cases, it
+ may refer to geographical and physical locality -- all the nodes in a
+ single building, on a single campus, or in a given vehicle. In other
+ cases, it may refer to a defined set of users or nodes distributed
+ over a much wider area, but drawn together by a single virtual
+ network over the Internet, or a single physical network running in
+ parallel with the Internet. We expand on these possibilities below.
+ To capture the topic, this document refers to such networks as
+ "limited domains". Of course, a similar situation may arise for a
+ network that is completely disconnected from the Internet, but that
+ is not our direct concern here. However, it should not be forgotten
+ that interoperability is needed even within a disconnected network.
+
+ Some people have concerns about splintering of the Internet along
+ political or linguistic boundaries by mechanisms that block the free
+ flow of information. That is not the topic of this document, which
+ does not discuss filtering mechanisms (see [RFC7754]) and does not
+ apply to protocols that are designed for use across the whole
+ Internet. It is only concerned with domains that have specific
+ technical requirements.
+
+ The word "domain" in this document does not refer to naming domains
+ in the DNS, although in some cases, a limited domain might
+ incidentally be congruent with a DNS domain. In particular, with a
+ "split horizon" DNS configuration [RFC6950], the split might be at
+ the edge of a limited domain. A recent proposal for defining
+ definite perimeters within the DNS namespace [DNS-PERIMETER] might
+ also be considered to be a limited domain mechanism.
+
+ Another term that has been used in some contexts is "controlled
+ environment". For example, [RFC8085] uses this to delimit the
+ operational scope within which a particular tunnel encapsulation
+ might be used. A specific example is GRE-in-UDP encapsulation
+ [RFC8086], which explicitly states that "The controlled environment
+ has less restrictive requirements than the general Internet." For
+ example, non-congestion-controlled traffic might be acceptable within
+ the controlled environment. The same phrase has been used to delimit
+ the useful scope of quality-of-service protocols [RFC6398]. It is
+ not necessarily the case that protocols will fail to operate outside
+ the controlled environment, but rather that they might not operate
+ optimally. In this document, we assume that "limited domain" and
+ "controlled environment" mean the same thing in practice. The term
+ "managed network" has been used in a similar way, e.g., [RFC6947].
+ In the context of secure multicast, a "group domain of
+ interpretation" is defined by [RFC6407].
+
+ Yet more definitions of types of domains are to be found in the
+ routing area, such as [RFC4397], [RFC4427], and [RFC4655]. We
+ conclude that the notion of a limited domain is very widespread in
+ many aspects of Internet technology.
+
+ The requirements of limited domains will depend on the deployment
+ scenario. Policies, default parameters, and the options supported
+ may vary. Also, the style of network management may vary between a
+ completely unmanaged network, one with fully autonomic management,
+ one with traditional central management, and mixtures of the above.
+ Finally, the requirements and solutions for security and privacy may
+ vary.
+
+ This document analyzes and discusses some of the consequences of this
+ trend and how it may impact the idea of universal interoperability in
+ the Internet. First, we list examples of limited domain scenarios
+ and of technical solutions for limited domains, with the main focus
+ being the Internet layer of the protocol stack. An appendix provides
+ a taxonomy of the features to be found in limited domains. With this
+ background, we discuss the resulting challenge to the idea that all
+ Internet standards must be universal in scope and applicability. To
+ the contrary, we assert that some protocols, although needing to be
+ standardized and interoperable, also need to be specifically limited
+ in their applicability. This implies that the concepts of a limited
+ domain, and of its membership, need to be formalized and supported by
+ secure mechanisms. While this document does not propose a design for
+ such mechanisms, it does outline some functional requirements.
+
+ This document is the product of the research of the authors. It has
+ been produced through discussions and consultation within the IETF
+ but is not the product of IETF consensus.
+
+2. Failure Modes in Today's Internet
+
+ Today, the Internet does not have a well-defined concept of limited
+ domains. One result of this is that certain protocols and features
+ fail on certain paths. Earlier analyses of this topic have focused
+ either on the loss of transparency of the Internet [RFC2775]
+ [RFC4924] or on the middleboxes responsible for that loss [RFC3234]
+ [RFC7663] [RFC8517]. Unfortunately, the problems persist both in
+ application protocols and even in very fundamental mechanisms. For
+ example, the Internet is not transparent to IPv6 extension headers
+ [RFC7872], and Path MTU Discovery has been unreliable for many years
+ [RFC2923] [RFC4821]. IP fragmentation is also unreliable
+ [FRAG-FRAGILE], and problems in TCP MSS negotiation have been
+ reported [IPV6-USE-MINMTU].
+
+ On the security side, the widespread insertion of firewalls at domain
+ boundaries that are perceived by humans but unknown to protocols
+ results in arbitrary failure modes as far as the application layer is
+ concerned. There are operational recommendations and practices that
+ effectively guarantee arbitrary failures in realistic scenarios
+ [IPV6-EXT-HEADERS].
+
+ Domain boundaries that are defined administratively (e.g., by address
+ filtering rules in routers) are prone to leakage caused by human
+ error, especially if the limited domain traffic appears otherwise
+ normal to the boundary routers. In this case, the network operator
+ needs to take active steps to protect the boundary. This form of
+ leakage is much less likely if nodes must be explicitly configured to
+ handle a given limited-domain protocol, for example, by installing a
+ specific protocol handler.
+
+ Investigations of the unreliability of IP fragmentation
+ [FRAG-FRAGILE] and the filtering of IPv6 extension headers [RFC7872]
+ strongly suggest that at least for some protocol elements,
+ transparency is a lost cause and middleboxes are here to stay. In
+ the following two sections, we show that some application
+ environments require protocol features that cannot, or should not,
+ cross the whole Internet.
+
+3. Examples of Limited Domain Requirements
+
+ This section describes various examples where limited domain
+ requirements can easily be identified, either based on an application
+ scenario or on a technical imperative. It is, of course, not a
+ complete list, and it is presented in an arbitrary order, loosely
+ from smaller to bigger.
+
+ 1. A home network. It will be mainly unmanaged, constructed by a
+ non-specialist. It must work with devices "out of the box" as
+ shipped by their manufacturers and must create adequate security
+ by default. Remote access may be required. The requirements
+ and applicable principles are summarized in [RFC7368].
+
+ 2. A small office network. This is sometimes very similar to a
+ home network, if whoever is in charge has little or no
+ specialist knowledge, but may have differing security and
+ privacy requirements. In other cases, it may be professionally
+ constructed using recommended products and configurations but
+ operate unmanaged. Remote access may be required.
+
+ 3. A vehicle network. This will be designed by the vehicle
+ manufacturer but may include devices added by the vehicle's
+ owner or operator. Parts of the network will have demanding
+ performance and reliability requirements with implications for
+ human safety. Remote access may be required to certain
+ functions but absolutely forbidden for others. Communication
+ with other vehicles, roadside infrastructure, and external data
+ sources will be required. See [IPWAVE-NETWORKING] for a survey
+ of use cases.
+
+ 4. Supervisory Control And Data Acquisition (SCADA) networks and
+ other hard real-time networks. These will exhibit specific
+ technical requirements, including tough real-time performance
+ targets. See, for example, [RFC8578] for numerous use cases.
+ An example is a building services network. This will be
+ designed specifically for a particular building but using
+ standard components. Additional devices may need to be added at
+ any time. Parts of the network may have demanding reliability
+ requirements with implications for human safety. Remote access
+ may be required to certain functions but absolutely forbidden
+ for others. An extreme example is a network used for virtual
+ reality or augmented reality applications where the latency
+ requirements are very stringent.
+
+ 5. Sensor networks. The two preceding cases will all include
+ sensors, but some networks may be specifically limited to
+ sensors and the collection and processing of sensor data. They
+ may be in remote or technically challenging locations and
+ installed by non-specialists.
+
+ 6. Internet-of-Things (IoT) networks. While this term is very
+ flexible and covers many innovative types of networks, including
+ ad hoc networks that are formed spontaneously and some
+ applications of 5G technology, it seems reasonable to expect
+ that IoT edge networks will have special requirements and
+ protocols that are useful only within a specific domain, and
+ that these protocols cannot, and for security reasons should
+ not, run over the Internet as a whole.
+
+ 7. Constrained Networks. An important subclass of IoT networks
+ consists of constrained networks [RFC7228] in which the nodes
+ are limited in power consumption and communications bandwidth
+ and are therefore limited to using very frugal protocols.
+
+ 8. Delay-tolerant networks. These may consist of domains that are
+ relatively isolated and constrained in power (e.g., deep space
+ networks) and are connected only intermittently to the outside,
+ with a very long latency on such connections [RFC4838].
+ Clearly, the protocol requirements and possibilities are very
+ specialized in such networks.
+
+ 9. "Traditional" enterprise and campus networks, which may be
+ spread over many kilometers and over multiple separate sites,
+ with multiple connections to the Internet. Interestingly, the
+ IETF appears never to have analyzed this long-established class
+ of networks in a general way, except in connection with IPv6
+ deployment (e.g., [RFC7381]).
+
+ 10. Unsuitable standards. A situation that can arise in an
+ enterprise network is that the Internet-wide solution for a
+ particular requirement may either fail locally or be much more
+ complicated than is necessary. An example is that the
+ complexity induced by a mechanism such as Interactive
+ Connectivity Establishment (ICE) [RFC8445] is not justified
+ within such a network. Furthermore, ICE cannot be used in some
+ cases because candidate addresses are not known before a call is
+ established, so a different local solution is essential
+ [RFC6947].
+
+ 11. Managed wide-area networks run by service providers for
+ enterprise services such as Layer 2 (Ethernet, etc.) point-to-
+ point pseudowires, multipoint Layer 2 Ethernet VPNs using
+ Virtual Private LAN Service (VPLS) or Ethernet VPN (EVPN), and
+ Layer 3 IP VPNs. These are generally characterized by service-
+ level agreements for availability, packet loss, and possibly
+ multicast service. These are different from the previous case
+ in that they mostly run over MPLS infrastructures, and the
+ requirements for these services are well defined by the IETF.
+
+ 12. Data centers and hosting centers, or distributed services acting
+ as such centers. These will have high performance, security,
+ and privacy requirements and will typically include large
+ numbers of independent "tenant" networks overlaid on shared
+ infrastructure.
+
+ 13. Content Delivery Networks (CDNs), comprising distributed data
+ centers and the paths between them, spanning thousands of
+ kilometers, with numerous connections to the Internet.
+
+ 14. Massive Web Service Provider Networks. This is a small class of
+ networks with well-known trademarked names, combining aspects of
+ distributed enterprise networks, data centers, and CDNs. They
+ have their own international networks bypassing the generic
+ carriers. Like CDNs, they have numerous connections to the
+ Internet, typically offering a tailored service in each economy.
+
+ Three other aspects, while not tied to specific network types, also
+ strongly depend on the concept of limited domains:
+
+ 1. Many of the above types of networks may be extended throughout
+ the Internet by a variety of virtual private network (VPN)
+ techniques. Therefore, we argue that limited domains may overlap
+ each other in an arbitrary fashion by use of virtualization
+ techniques. As noted above in the discussion of controlled
+ environments, specific tunneling and encapsulation techniques may
+ be tailored for use within a given domain.
+
+ 2. Intent-Based Networking. In this concept, a network domain is
+ configured and managed in accordance with an abstract policy
+ known as "Intent" to ensure that the network performs as required
+ [IBN-CONCEPTS]. Whatever technologies are used to support this
+ will be applied within the domain boundary, even if the services
+ supported in the domain are globally accessible.
+
+ 3. Network Slicing. A network slice is a form of virtual network
+ that consists of a managed set of resources carved off from a
+ larger network [ENHANCED-VPN]. This is expected to be
+ significant in 5G deployments [USER-PLANE-PROTOCOL]. Whatever
+ technologies are used to support slicing will require a clear
+ definition of the boundary of a given slice within a larger
+ domain.
+
+ While it is clearly desirable to use common solutions, and therefore
+ common standards, wherever possible, it is increasingly difficult to
+ do so while satisfying the widely varying requirements outlined
+ above. However, there is a tendency when new protocols and protocol
+ extensions are proposed to always ask the question "How will this
+ work across the open Internet?" This document suggests that this is
+ not always the best question. There are protocols and extensions
+ that are not intended to work across the open Internet. On the
+ contrary, their requirements and semantics are specifically limited
+ (in the sense defined above).
+
+ A common argument is that if a protocol is intended for limited use,
+ the chances are very high that it will in fact be used (or misused)
+ in other scenarios including the so-called open Internet. This is
+ undoubtedly true and means that limited use is not an excuse for bad
+ design or poor security. In fact, a limited use requirement
+ potentially adds complexity to both the protocol and its security
+ design, as discussed later.
+
+ Nevertheless, because of the diversity of limited domains with
+ specific requirements that is now emerging, specific standards (and
+ ad hoc standards) will probably emerge for different types of
+ domains. There will be attempts to capture each market sector, but
+ the market will demand standardized solutions within each sector. In
+ addition, operational choices will be made that can in fact only work
+ within a limited domain. The history of RSVP [RFC2205] illustrates
+ that a standard defined as if it could work over the open Internet
+ might not in fact do so. In general, we can no longer assume that a
+ protocol designed according to classical Internet guidelines will in
+ fact work reliably across the network as a whole. However, the "open
+ Internet" must remain as the universal method of interconnection.
+ Reconciling these two aspects is a major challenge.
+
+4. Examples of Limited Domain Solutions
+
+ This section lists various examples of specific limited domain
+ solutions that have been proposed or defined. It intentionally does
+ not include Layer 2 technology solutions, which by definition apply
+ to limited domains. It is worth noting, however, that with recent
+ developments such as Transparent Interconnection of Lots of Links
+ (TRILL) [RFC6325] or Shortest Path Bridging [SPB], Layer 2 domains
+ may become very large.
+
+ 1. Differentiated Services. This mechanism [RFC2474] allows a
+ network to assign locally significant values to the 6-bit
+ Differentiated Services Code Point field in any IP packet.
+ Although there are some recommended code point values for
+ specific per-hop queue management behaviors, these are
+ specifically intended to be domain-specific code points with
+ traffic being classified, conditioned, and mapped or re-marked
+ at domain boundaries (unless there is an inter-domain agreement
+ that makes mapping or re-marking unnecessary).
+
+ 2. Integrated Services. Although it is not intrinsic in the design
+ of RSVP [RFC2205], it is clear from many years' experience that
+ Integrated Services can only be deployed successfully within a
+ limited domain that is configured with adequate equipment and
+ resources.
+
+ 3. Network function virtualization. As described in [RFC8568],
+ this general concept is an open research topic in which virtual
+ network functions are orchestrated as part of a distributed
+ system. Inevitably, such orchestration applies to an
+ administrative domain of some kind, even though cross-domain
+ orchestration is also a research area.
+
+ 4. Service Function Chaining (SFC). This technique [RFC7665]
+ assumes that services within a network are constructed as
+ sequences of individual service functions within a specific SFC-
+ enabled domain such as a 5G domain. As that RFC states:
+ "Specific features may need to be enforced at the boundaries of
+ an SFC-enabled domain, for example to avoid leaking SFC
+ information". A Network Service Header (NSH) [RFC8300] is used
+ to encapsulate packets flowing through the service function
+ chain: "The intended scope of the NSH is for use within a single
+ provider's operational domain."
+
+ 5. Firewall and Service Tickets (FAST). Such tickets would
+ accompany a packet to claim the right to traverse a network or
+ request a specific network service [FAST]. They would only be
+ meaningful within a particular domain.
+
+ 6. Data Center Network Virtualization Overlays. A common
+ requirement in data centers that host many tenants (clients) is
+ to provide each one with a secure private network, all running
+ over the same physical infrastructure. [RFC8151] describes
+ various use cases for this, and specifications are under
+ development. These include use cases in which the tenant
+ network is physically split over several data centers, but which
+ must appear to the user as a single secure domain.
+
+ 7. Segment Routing. This is a technique that "steers a packet
+ through an ordered list of instructions, called segments"
+ [RFC8402]. The semantics of these instructions are explicitly
+ local to a segment routing domain or even to a single node.
+ Technically, these segments or instructions are represented as
+ an MPLS label or an IPv6 address, which clearly adds a semantic
+ interpretation to them within the domain.
+
+ 8. Autonomic Networking. As explained in [REF-MODEL], an autonomic
+ network is also a security domain within which an autonomic
+ control plane [ACP] is used by autonomic service agents. These
+ agents manage technical objectives, which may be locally
+ defined, subject to domain-wide policy. Thus, the domain
+ boundary is important for both security and protocol purposes.
+
+ 9. Homenet. As shown in [RFC7368], a home networking domain has
+ specific protocol needs that differ from those in an enterprise
+ network or the Internet as a whole. These include the Home
+ Network Control Protocol (HNCP) [RFC7788] and a naming and
+ discovery solution [HOMENET-NAMING].
+
+ 10. Creative uses of IPv6 features. As IPv6 enters more general
+ use, engineers notice that it has much more flexibility than
+ IPv4. Innovative suggestions have been made for:
+
+ * The flow label, e.g., [RFC6294].
+
+ * Extension headers, e.g., for segment routing [RFC8754] or
+ Operations, Administration, and Maintenance (OAM) marking
+ [IPV6-ALT-MARK].
+
+ * Meaningful address bits, e.g., [EMBEDDED-SEMANTICS]. Also,
+ segment routing uses IPv6 addresses as segment identifiers
+ with specific local meanings [RFC8402].
+
+ * If segment routing is used for network programming
+ [SRV6-NETWORK], IPv6 extension headers can support rather
+ complex local functionality.
+
+ The case of the extension header is particularly interesting,
+ since its existence has been a major "selling point" for IPv6,
+ but new extension headers are notorious for being virtually
+ impossible to deploy across the whole Internet [RFC7045]
+ [RFC7872]. It is worth noting that extension header filtering
+ is considered an important security issue [IPV6-EXT-HEADERS].
+ There is considerable appetite among vendors or operators to
+ have flexibility in defining extension headers for use in
+ limited or specialized domains, e.g., [IPV6-SRH], [BIGIP], and
+ [APP-AWARE]. Locally significant hop-by-hop options are also
+ envisaged, that would be understood by routers inside a domain
+ but not elsewhere, e.g., [IN-SITU-OAM].
+
+ 11. Deterministic Networking (DetNet). The Deterministic Networking
+ Architecture [RFC8655] and encapsulation [DETNET-DATA-PLANE] aim
+ to support flows with extremely low data loss rates and bounded
+ latency but only within a part of the network that is "DetNet
+ aware". Thus, as for Differentiated Services above, the concept
+ of a domain is fundamental.
+
+ 12. Provisioning Domains (PvDs). An architecture for Multiple
+ Provisioning Domains has been defined [RFC7556] to allow hosts
+ attached to multiple networks to learn explicit details about
+ the services provided by each of those networks.
+
+ 13. Address Scopes. For completeness, we mention that, particularly
+ in IPv6, some addresses have explicitly limited scope. In
+ particular, link-local addresses are limited to a single
+ physical link [RFC4291], and Unique Local Addresses [RFC4193]
+ are limited to a somewhat loosely defined local site scope.
+ Previously, site-local addresses were defined, but they were
+ obsoleted precisely because of "the fuzzy nature of the site
+ concept" [RFC3879]. Multicast addresses also have explicit
+ scoping [RFC4291].
+
+ 14. As an application-layer example, consider streaming services
+ such as IPTV infrastructures that rely on standard protocols,
+ but for which access is not globally available.
+
+ All of these suggestions are only viable within a specified domain.
+ Nevertheless, all of them are clearly intended for multivendor
+ implementation on thousands or millions of network domains, so
+ interoperable standardization would be beneficial. This argument
+ might seem irrelevant to private or proprietary implementations, but
+ these have a strong tendency to become de facto standards if they
+ succeed, so the arguments of this document still apply.
+
+5. The Scope of Protocols in Limited Domains
+
+ One consequence of the deployment of limited domains in the Internet
+ is that some protocols will be designed, extended, or configured so
+ that they only work correctly between end systems in such domains.
+ This is to some extent encouraged by some existing standards and by
+ the assignment of code points for local or experimental use. In any
+ case, it cannot be prevented. Also, by endorsing efforts such as
+ Service Function Chaining, Segment Routing, and Deterministic
+ Networking, the IETF is in effect encouraging such deployments.
+ Furthermore, it seems inevitable, if the Internet of Things becomes
+ reality, that millions of edge networks containing completely novel
+ types of nodes will be connected to the Internet; each one of these
+ edge networks will be a limited domain.
+
+ It is therefore appropriate to discuss whether protocols or protocol
+ extensions should sometimes be standardized to interoperate only
+ within a limited-domain boundary. Such protocols would not be
+ required to interoperate across the Internet as a whole. Various
+ scenarios could then arise if there are multiple domains using the
+ limited-domain protocol in question:
+
+ A. If a domain is split into two parts connected over the Internet
+ directly at the IP layer (i.e., with no tunnel encapsulating the
+ packets), a limited-domain protocol could be operated between
+ those two parts regardless of its special nature, as long as it
+ respects standard IP formats and is not arbitrarily blocked by
+ firewalls. A simple example is any protocol using a port number
+ assigned to a specific non-IETF protocol.
+
+ Such a protocol could reasonably be described as an "inter-
+ domain" protocol because the Internet is transparent to it, even
+ if it is meaningless except in the two limited domains. This is,
+ of course, nothing new in the Internet architecture.
+
+ B. If a limited-domain protocol does not respect standard IP formats
+ (for example, if it includes a non-standard IPv6 extension
+ header), it could not be operated between two domains connected
+ over the Internet directly at the IP layer.
+
+ Such a protocol could reasonably be described as an "intra-
+ domain" protocol, and the Internet is opaque to it.
+
+ C. If a limited-domain protocol is clearly specified to be invalid
+ outside its domain of origin, neither scenario A nor B applies.
+ The only solution would be a single virtual domain. For example,
+ an encapsulating tunnel between two domains could be used to
+ create the virtual domain. Also, nodes at the domain boundary
+ must drop all packets using the limited-domain protocol.
+
+ D. If a limited-domain protocol has domain-specific variants, such
+ that implementations in different domains could not interoperate
+ if those domains were unified by some mechanism as in scenario C,
+ the protocol is not interoperable in the normal sense. If two
+ domains using it were merged, the protocol might fail
+ unpredictably. A simple example is any protocol using a port
+ number assigned for experimental use. Related issues are
+ discussed in [RFC5704], including the complex example of
+ Transport MPLS.
+
+ To provide a widespread example, consider Differentiated Services
+ [RFC2474]. A packet containing any value whatsoever in the 6 bits of
+ the Differentiated Services Code Point (DSCP) is well formed and
+ falls into scenario A. However, because the semantics of DSCP values
+ are locally significant, the packet also falls into scenario D. In
+ fact, Differentiated Services are only interoperable across domain
+ boundaries if there is a corresponding agreement between the
+ operators; otherwise, a specific gateway function is required for
+ meaningful interoperability. Much more detailed discussion is found
+ in [RFC2474] and [RFC8100].
+
+ To provide a provocative example, consider the proposal in [IPV6-SRH]
+ that the restrictions in [RFC8200] should be relaxed to allow IPv6
+ extension headers to be inserted on the fly in IPv6 packets. If this
+ is done in such a way that the affected packets can never leave the
+ specific limited domain in which they were modified, scenario C
+ applies. If the semantic content of the inserted headers is locally
+ defined, scenario D also applies. In neither case is the Internet
+ outside the limited domain disturbed. However, inside the domain,
+ nodes must understand the variant protocol. Unless it is
+ standardized as a formal version, with all the complexity that
+ implies [RFC6709], the nodes must all be non-standard to the extent
+ of understanding the variant protocol. For the example of IPv6
+ header insertion, that means non-compliance with [RFC8200] within the
+ domain, even if the inserted headers are themselves fully compliant.
+ Apart from the issue of formal compliance, such deviations from
+ documented standard behavior might lead to significant debugging
+ issues. The possible practical impact of the header insertion
+ example is explored in [IN-FLIGHT-IPV6].
+
+ The FAST proposal mentioned in Section 4, Paragraph 2, Item 5 is also
+ an interesting case study. The semantics of FAST tickets [FAST] have
+ limited scope. However, they are designed in a way that, in
+ principle, allows them to traverse the open Internet, as standardized
+ IPv6 hop-by-hop options or even as a proposed form of IPv4 extension
+ header [IPV4-EXT-HEADERS]. Whether such options can be used reliably
+ across the open Internet remains unclear [IPV6-EXT-HEADERS].
+
+ We conclude that it is reasonable to explicitly define limited-domain
+ protocols, either as standards or as proprietary mechanisms, as long
+ as they describe which of the above scenarios apply and they clarify
+ how the domain is defined. As long as all relevant standards are
+ respected outside the domain boundary, a well-specified limited-
+ domain protocol need not damage the rest of the Internet. However,
+ as described in the next section, mechanisms are needed to support
+ domain membership operations.
+
+ Note that this conclusion is not a recommendation to abandon the
+ normal goal that a standardized protocol should be global in scope
+ and able to interoperate across the open Internet. It is simply a
+ recognition that this will not always be the case.
+
+6. Functional Requirements of Limited Domains
+
+ Noting that limited-domain protocols have been defined in the past,
+ and that others will undoubtedly be defined in the future, it is
+ useful to consider how a protocol can be made aware of the domain
+ within which it operates and how the domain boundary nodes can be
+ identified. As the taxonomy in Appendix A shows, there are numerous
+ aspects to a domain. However, we can identify some generally
+ required features and functions that would apply partially or
+ completely to many cases.
+
+ Today, where limited domains exist, they are essentially created by
+ careful configuration of boundary routers and firewalls. If a domain
+ is characterized by one or more address prefixes, address assignment
+ to hosts must also be carefully managed. This is an error-prone
+ method, and a combination of configuration errors and default routing
+ can lead to unwanted traffic escaping the domain. Our basic
+ assumption is therefore that it should be possible for domains to be
+ created and managed automatically, with minimal human configuration.
+ We now discuss requirements for automating domain creation and
+ management.
+
+ First, if we drew a topology map, any given domain -- virtual or
+ physical -- will have a well-defined boundary between "inside" and
+ "outside". However, that boundary in itself has no technical
+ meaning. What matters in reality is whether a node is a member of
+ the domain and whether it is at the boundary between the domain and
+ the rest of the Internet. Thus, the boundary in itself does not need
+ to be identified, but boundary nodes face both inwards and outwards.
+ Inside the domain, a sending node needs to know whether it is sending
+ to an inside or outside destination, and a receiving node needs to
+ know whether a packet originated inside or outside. Also, a boundary
+ node needs to know which of its interfaces are inward facing or
+ outward facing. It is irrelevant whether the interfaces involved are
+ physical or virtual.
+
+ To underline that domain boundaries need to be identifiable, consider
+ the statement from the Deterministic Networking Problem Statement
+ [RFC8557] that "there is still a lack of clarity regarding the limits
+ of a domain where a deterministic path can be set up". This remark
+ can certainly be generalized.
+
+ With this perspective, we can list some general functional
+ requirements. An underlying assumption here is that domain
+ membership operations should be cryptographically secured; a domain
+ without such security cannot be reliably protected from attack.
+
+ 1. Domain Identity. A domain must have a unique and verifiable
+ identifier; effectively, this should be a public key for the
+ domain. Without this, there is no way to secure domain
+ operations and domain membership. The holder of the
+ corresponding private key becomes the trust anchor for the
+ domain.
+
+ 2. Nesting. It must be possible for domains to be nested (see, for
+ example, the network-slicing example mentioned above).
+
+ 3. Overlapping. It must be possible for nodes and links to be in
+ more than one domain (see, for example, the case of PvDs
+ mentioned above).
+
+ 4. Node Eligibility. It must be possible for a node to determine
+ which domain(s) it can potentially join and on which
+ interface(s).
+
+ 5. Secure Enrollment. A node must be able to enroll in a given
+ domain via secure node identification and to acquire relevant
+ security credentials (authorization) for operations within the
+ domain. If a node has multiple physical or virtual interfaces,
+ individual enrollment for each interface may be required.
+
+ 6. Withdrawal. A node must be able to cancel enrollment in a given
+ domain.
+
+ 7. Dynamic Membership. Optionally, a node should be able to
+ temporarily leave or rejoin a domain (i.e., enrollment is
+ persistent but membership is intermittent).
+
+ 8. Role, implying authorization to perform a certain set of
+ actions. A node must have a verifiable role. In the simplest
+ case, the role choices are "interior node" and "boundary node".
+ In a boundary node, individual interfaces may have different
+ roles, e.g., "inward facing" and "outward facing".
+
+ 9. Peer Verification. A node must be able to verify whether
+ another node is a member of the domain.
+
+ 10. Role Verification. A node should be able to learn the verified
+ role of another node. In particular, it should be possible for
+ a node to find boundary nodes (interfacing to the Internet).
+
+ 11. Domain Data. In a domain with management requirements, it must
+ be possible for a node to acquire domain policy and/or domain
+ configuration data. This would include, for example, filtering
+ policy to ensure that inappropriate packets do not leave the
+ domain.
+
+ These requirements could form the basis for further analysis and
+ solution design.
+
+ Another aspect is whether individual packets within a limited domain
+ need to carry any sort of indicator that they belong to that domain
+ or whether this information will be implicit in the IP addresses of
+ the packet. A related question is whether individual packets need
+ cryptographic authentication. This topic is for further study.
+
+7. Security Considerations
+
+ As noted above, a protocol intended for limited use may well be
+ inadvertently used on the open Internet, so limited use is not an
+ excuse for poor security. In fact, a limited use requirement
+ potentially adds complexity to the security design.
+
+ Often, the boundary of a limited domain will also act as a security
+ boundary. In particular, it will serve as a trust boundary and as a
+ boundary of authority for defining capabilities. For example,
+ segment routing [RFC8402] explicitly uses the concept of a "trusted
+ domain" in this way. Within the boundary, limited-domain protocols
+ or protocol features will be useful, but they will in many cases be
+ meaningless or harmful if they enter or leave the domain.
+
+ The boundary also serves to provide confidentiality and privacy for
+ operational parameters that the operator does not wish to reveal.
+ Note that this is distinct from privacy protection for individual
+ users within the domain.
+
+ The security model for a limited-scope protocol must allow for the
+ boundary and in particular for a trust model that changes at the
+ boundary. Typically, credentials will need to be signed by a domain-
+ specific authority.
+
+8. IANA Considerations
+
+ This document has no IANA actions.
+
+
+9. Informative References
+
+ [ACP] Eckert, T., Behringer, M., and S. Bjarnason, "An Autonomic
+ Control Plane (ACP)", Work in Progress, Internet-Draft,
+ draft-ietf-anima-autonomic-control-plane-27, 2 July 2020,
+ <https://tools.ietf.org/html/draft-ietf-anima-autonomic-
+ control-plane-27>.
+
+ [APP-AWARE]
+ Li, Z., Peng, S., Li, C., Xie, C., Voyer, D., Li, X., Liu,
+ P., Liu, C., and K. Ebisawa, "Application-aware IPv6
+ Networking (APN6) Encapsulation", Work in Progress,
+ Internet-Draft, draft-li-6man-app-aware-ipv6-network-02, 2
+ July 2020, <https://tools.ietf.org/html/draft-li-6man-app-
+ aware-ipv6-network-02>.
+
+ [BIGIP] Li, R., "HUAWEI - Big IP Initiative", 2018,
+ <https://www.iaria.org/announcements/HuaweiBigIP.pdf>.
+
+ [DETNET-DATA-PLANE]
+ Varga, B., Farkas, J., Berger, L., Malis, A., and S.
+ Bryant, "DetNet Data Plane Framework", Work in Progress,
+ Internet-Draft, draft-ietf-detnet-data-plane-framework-06,
+ 6 May 2020, <https://tools.ietf.org/html/draft-ietf-
+ detnet-data-plane-framework-06>.
+
+ [DNS-PERIMETER]
+ Crocker, D. and T. Adams, "DNS Perimeter Overlay", Work in
+ Progress, Internet-Draft, draft-dcrocker-dns-perimeter-01,
+ 11 June 2019, <https://tools.ietf.org/html/draft-dcrocker-
+ dns-perimeter-01>.
+
+ [EMBEDDED-SEMANTICS]
+ Jiang, S., Qiong, Q., Farrer, I., Bo, Y., and T. Yang,
+ "Analysis of Semantic Embedded IPv6 Address Schemas", Work
+ in Progress, Internet-Draft, draft-jiang-semantic-prefix-
+ 06, 15 July 2013, <https://tools.ietf.org/html/draft-
+ jiang-semantic-prefix-06>.
+
+ [ENHANCED-VPN]
+ Dong, J., Bryant, S., Li, Z., Miyasaka, T., and Y. Lee, "A
+ Framework for Enhanced Virtual Private Networks (VPN+)
+ Service", Work in Progress, Internet-Draft, draft-ietf-
+ teas-enhanced-vpn-06, 13 July 2020,
+ <https://tools.ietf.org/html/draft-ietf-teas-enhanced-vpn-
+ 06>.
+
+ [FAST] Herbert, T., "Firewall and Service Tickets", Work in
+ Progress, Internet-Draft, draft-herbert-fast-04, 10 April
+ 2019, <https://tools.ietf.org/html/draft-herbert-fast-04>.
+
+ [FRAG-FRAGILE]
+ Bonica, R., Baker, F., Huston, G., Hinden, R., Troan, O.,
+ and F. Gont, "IP Fragmentation Considered Fragile", Work
+ in Progress, Internet-Draft, draft-ietf-intarea-frag-
+ fragile-17, 30 September 2019,
+ <https://tools.ietf.org/html/draft-ietf-intarea-frag-
+ fragile-17>.
+
+ [HOMENET-NAMING]
+ Lemon, T., Migault, D., and S. Cheshire, "Homenet Naming
+ and Service Discovery Architecture", Work in Progress,
+ Internet-Draft, draft-ietf-homenet-simple-naming-03, 23
+ October 2018, <https://tools.ietf.org/html/draft-ietf-
+ homenet-simple-naming-03>.
+
+ [IBN-CONCEPTS]
+ Clemm, A., Ciavaglia, L., Granville, L., and J. Tantsura,
+ "Intent-Based Networking - Concepts and Definitions", Work
+ in Progress, Internet-Draft, draft-irtf-nmrg-ibn-concepts-
+ definitions-01, 9 March 2020,
+ <https://tools.ietf.org/html/draft-irtf-nmrg-ibn-concepts-
+ definitions-01>.
+
+ [IN-FLIGHT-IPV6]
+ Smith, M., Kottapalli, N., Bonica, R., Gont, F., and T.
+ Herbert, "In-Flight IPv6 Extension Header Insertion
+ Considered Harmful", Work in Progress, Internet-Draft,
+ draft-smith-6man-in-flight-eh-insertion-harmful-02, 30 May
+ 2020, <https://tools.ietf.org/html/draft-smith-6man-in-
+ flight-eh-insertion-harmful-02>.
+
+ [IN-SITU-OAM]
+ Bhandari, S., Brockners, F., Pignataro, C., Gredler, H.,
+ Leddy, J., Youell, S., Mizrahi, T., Kfir, A., Gafni, B.,
+ Lapukhov, P., Spiegel, M., Krishnan, S., and R. Asati,
+ "In-situ OAM IPv6 Options", Work in Progress, Internet-
+ Draft, draft-ietf-ippm-ioam-ipv6-options-02, 13 July 2020,
+ <https://tools.ietf.org/html/draft-ietf-ippm-ioam-ipv6-
+ options-02>.
+
+ [IPV4-EXT-HEADERS]
+ Herbert, T., "IPv4 Extension Headers and Flow Label", Work
+ in Progress, Internet-Draft, draft-herbert-ipv4-eh-01, 2
+ May 2019,
+ <https://tools.ietf.org/html/draft-herbert-ipv4-eh-01>.
+
+ [IPV6-ALT-MARK]
+ Fioccola, G., Zhou, T., Cociglio, M., Qin, F., and R.
+ Pang, "IPv6 Application of the Alternate Marking Method",
+ Work in Progress, Internet-Draft, draft-ietf-6man-ipv6-
+ alt-mark-01, 22 June 2020, <https://tools.ietf.org/html/
+ draft-ietf-6man-ipv6-alt-mark-01>.
+
+ [IPV6-EXT-HEADERS]
+ Gont, F. and W. LIU, "Recommendations on the Filtering of
+ IPv6 Packets Containing IPv6 Extension Headers", Work in
+ Progress, Internet-Draft, draft-ietf-opsec-ipv6-eh-
+ filtering-06, 2 July 2018, <https://tools.ietf.org/html/
+ draft-ietf-opsec-ipv6-eh-filtering-06>.
+
+ [IPV6-SRH] Voyer, D., Filsfils, C., Dukes, D., Matsushima, S., Leddy,
+ J., Li, Z., and J. Guichard, "Deployments With Insertion
+ of IPv6 Segment Routing Headers", Work in Progress,
+ Internet-Draft, draft-voyer-6man-extension-header-
+ insertion-09, 19 May 2020, <https://tools.ietf.org/html/
+ draft-voyer-6man-extension-header-insertion-09>.
+
+ [IPV6-USE-MINMTU]
+ Andrews, M., "TCP Fails To Respect IPV6_USE_MIN_MTU", Work
+ in Progress, Internet-Draft, draft-andrews-tcp-and-ipv6-
+ use-minmtu-04, 18 October 2015,
+ <https://tools.ietf.org/html/draft-andrews-tcp-and-ipv6-
+ use-minmtu-04>.
+
+ [IPWAVE-NETWORKING]
+ Jeong, J., "IPv6 Wireless Access in Vehicular Environments
+ (IPWAVE): Problem Statement and Use Cases", Work in
+ Progress, Internet-Draft, draft-ietf-ipwave-vehicular-
+ networking-16, 7 July 2020, <https://tools.ietf.org/html/
+ draft-ietf-ipwave-vehicular-networking-16>.
+
+ [REF-MODEL]
+ Behringer, M., Carpenter, B., Eckert, T., Ciavaglia, L.,
+ and J. Nobre, "A Reference Model for Autonomic
+ Networking", Work in Progress, Internet-Draft, draft-ietf-
+ anima-reference-model-10, 22 November 2018,
+ <https://tools.ietf.org/html/draft-ietf-anima-reference-
+ model-10>.
+
+ [RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
+ Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
+ Functional Specification", RFC 2205, DOI 10.17487/RFC2205,
+ September 1997, <https://www.rfc-editor.org/info/rfc2205>.
+
+ [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
+ "Definition of the Differentiated Services Field (DS
+ Field) in the IPv4 and IPv6 Headers", RFC 2474,
+ DOI 10.17487/RFC2474, December 1998,
+ <https://www.rfc-editor.org/info/rfc2474>.
+
+ [RFC2775] Carpenter, B., "Internet Transparency", RFC 2775,
+ DOI 10.17487/RFC2775, February 2000,
+ <https://www.rfc-editor.org/info/rfc2775>.
+
+ [RFC2923] Lahey, K., "TCP Problems with Path MTU Discovery",
+ RFC 2923, DOI 10.17487/RFC2923, September 2000,
+ <https://www.rfc-editor.org/info/rfc2923>.
+
+ [RFC3234] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy and
+ Issues", RFC 3234, DOI 10.17487/RFC3234, February 2002,
+ <https://www.rfc-editor.org/info/rfc3234>.
+
+ [RFC3879] Huitema, C. and B. Carpenter, "Deprecating Site Local
+ Addresses", RFC 3879, DOI 10.17487/RFC3879, September
+ 2004, <https://www.rfc-editor.org/info/rfc3879>.
+
+ [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast
+ Addresses", RFC 4193, DOI 10.17487/RFC4193, October 2005,
+ <https://www.rfc-editor.org/info/rfc4193>.
+
+ [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
+ Architecture", RFC 4291, DOI 10.17487/RFC4291, February
+ 2006, <https://www.rfc-editor.org/info/rfc4291>.
+
+ [RFC4397] Bryskin, I. and A. Farrel, "A Lexicography for the
+ Interpretation of Generalized Multiprotocol Label
+ Switching (GMPLS) Terminology within the Context of the
+ ITU-T's Automatically Switched Optical Network (ASON)
+ Architecture", RFC 4397, DOI 10.17487/RFC4397, February
+ 2006, <https://www.rfc-editor.org/info/rfc4397>.
+
+ [RFC4427] Mannie, E., Ed. and D. Papadimitriou, Ed., "Recovery
+ (Protection and Restoration) Terminology for Generalized
+ Multi-Protocol Label Switching (GMPLS)", RFC 4427,
+ DOI 10.17487/RFC4427, March 2006,
+ <https://www.rfc-editor.org/info/rfc4427>.
+
+ [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path
+ Computation Element (PCE)-Based Architecture", RFC 4655,
+ DOI 10.17487/RFC4655, August 2006,
+ <https://www.rfc-editor.org/info/rfc4655>.
+
+ [RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU
+ Discovery", RFC 4821, DOI 10.17487/RFC4821, March 2007,
+ <https://www.rfc-editor.org/info/rfc4821>.
+
+ [RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst,
+ R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant
+ Networking Architecture", RFC 4838, DOI 10.17487/RFC4838,
+ April 2007, <https://www.rfc-editor.org/info/rfc4838>.
+
+ [RFC4924] Aboba, B., Ed. and E. Davies, "Reflections on Internet
+ Transparency", RFC 4924, DOI 10.17487/RFC4924, July 2007,
+ <https://www.rfc-editor.org/info/rfc4924>.
+
+ [RFC5704] Bryant, S., Ed., Morrow, M., Ed., and IAB, "Uncoordinated
+ Protocol Development Considered Harmful", RFC 5704,
+ DOI 10.17487/RFC5704, November 2009,
+ <https://www.rfc-editor.org/info/rfc5704>.
+
+ [RFC6294] Hu, Q. and B. Carpenter, "Survey of Proposed Use Cases for
+ the IPv6 Flow Label", RFC 6294, DOI 10.17487/RFC6294, June
+ 2011, <https://www.rfc-editor.org/info/rfc6294>.
+
+ [RFC6325] Perlman, R., Eastlake 3rd, D., Dutt, D., Gai, S., and A.
+ Ghanwani, "Routing Bridges (RBridges): Base Protocol
+ Specification", RFC 6325, DOI 10.17487/RFC6325, July 2011,
+ <https://www.rfc-editor.org/info/rfc6325>.
+
+ [RFC6398] Le Faucheur, F., Ed., "IP Router Alert Considerations and
+ Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
+ 2011, <https://www.rfc-editor.org/info/rfc6398>.
+
+ [RFC6407] Weis, B., Rowles, S., and T. Hardjono, "The Group Domain
+ of Interpretation", RFC 6407, DOI 10.17487/RFC6407,
+ October 2011, <https://www.rfc-editor.org/info/rfc6407>.
+
+ [RFC6709] Carpenter, B., Aboba, B., Ed., and S. Cheshire, "Design
+ Considerations for Protocol Extensions", RFC 6709,
+ DOI 10.17487/RFC6709, September 2012,
+ <https://www.rfc-editor.org/info/rfc6709>.
+
+ [RFC6947] Boucadair, M., Kaplan, H., Gilman, R., and S.
+ Veikkolainen, "The Session Description Protocol (SDP)
+ Alternate Connectivity (ALTC) Attribute", RFC 6947,
+ DOI 10.17487/RFC6947, May 2013,
+ <https://www.rfc-editor.org/info/rfc6947>.
+
+ [RFC6950] Peterson, J., Kolkman, O., Tschofenig, H., and B. Aboba,
+ "Architectural Considerations on Application Features in
+ the DNS", RFC 6950, DOI 10.17487/RFC6950, October 2013,
+ <https://www.rfc-editor.org/info/rfc6950>.
+
+ [RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing
+ of IPv6 Extension Headers", RFC 7045,
+ DOI 10.17487/RFC7045, December 2013,
+ <https://www.rfc-editor.org/info/rfc7045>.
+
+ [RFC7228] Bormann, C., Ersue, M., and A. Keranen, "Terminology for
+ Constrained-Node Networks", RFC 7228,
+ DOI 10.17487/RFC7228, May 2014,
+ <https://www.rfc-editor.org/info/rfc7228>.
+
+ [RFC7368] Chown, T., Ed., Arkko, J., Brandt, A., Troan, O., and J.
+ Weil, "IPv6 Home Networking Architecture Principles",
+ RFC 7368, DOI 10.17487/RFC7368, October 2014,
+ <https://www.rfc-editor.org/info/rfc7368>.
+
+ [RFC7381] Chittimaneni, K., Chown, T., Howard, L., Kuarsingh, V.,
+ Pouffary, Y., and E. Vyncke, "Enterprise IPv6 Deployment
+ Guidelines", RFC 7381, DOI 10.17487/RFC7381, October 2014,
+ <https://www.rfc-editor.org/info/rfc7381>.
+
+ [RFC7556] Anipko, D., Ed., "Multiple Provisioning Domain
+ Architecture", RFC 7556, DOI 10.17487/RFC7556, June 2015,
+ <https://www.rfc-editor.org/info/rfc7556>.
+
+ [RFC7663] Trammell, B., Ed. and M. Kuehlewind, Ed., "Report from the
+ IAB Workshop on Stack Evolution in a Middlebox Internet
+ (SEMI)", RFC 7663, DOI 10.17487/RFC7663, October 2015,
+ <https://www.rfc-editor.org/info/rfc7663>.
+
+ [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function
+ Chaining (SFC) Architecture", RFC 7665,
+ DOI 10.17487/RFC7665, October 2015,
+ <https://www.rfc-editor.org/info/rfc7665>.
+
+ [RFC7754] Barnes, R., Cooper, A., Kolkman, O., Thaler, D., and E.
+ Nordmark, "Technical Considerations for Internet Service
+ Blocking and Filtering", RFC 7754, DOI 10.17487/RFC7754,
+ March 2016, <https://www.rfc-editor.org/info/rfc7754>.
+
+ [RFC7788] Stenberg, M., Barth, S., and P. Pfister, "Home Networking
+ Control Protocol", RFC 7788, DOI 10.17487/RFC7788, April
+ 2016, <https://www.rfc-editor.org/info/rfc7788>.
+
+ [RFC7872] Gont, F., Linkova, J., Chown, T., and W. Liu,
+ "Observations on the Dropping of Packets with IPv6
+ Extension Headers in the Real World", RFC 7872,
+ DOI 10.17487/RFC7872, June 2016,
+ <https://www.rfc-editor.org/info/rfc7872>.
+
+ [RFC8085] Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage
+ Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085,
+ March 2017, <https://www.rfc-editor.org/info/rfc8085>.
+
+ [RFC8086] Yong, L., Ed., Crabbe, E., Xu, X., and T. Herbert, "GRE-
+ in-UDP Encapsulation", RFC 8086, DOI 10.17487/RFC8086,
+ March 2017, <https://www.rfc-editor.org/info/rfc8086>.
+
+ [RFC8100] Geib, R., Ed. and D. Black, "Diffserv-Interconnection
+ Classes and Practice", RFC 8100, DOI 10.17487/RFC8100,
+ March 2017, <https://www.rfc-editor.org/info/rfc8100>.
+
+ [RFC8151] Yong, L., Dunbar, L., Toy, M., Isaac, A., and V. Manral,
+ "Use Cases for Data Center Network Virtualization Overlay
+ Networks", RFC 8151, DOI 10.17487/RFC8151, May 2017,
+ <https://www.rfc-editor.org/info/rfc8151>.
+
+ [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", STD 86, RFC 8200,
+ DOI 10.17487/RFC8200, July 2017,
+ <https://www.rfc-editor.org/info/rfc8200>.
+
+ [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed.,
+ "Network Service Header (NSH)", RFC 8300,
+ DOI 10.17487/RFC8300, January 2018,
+ <https://www.rfc-editor.org/info/rfc8300>.
+
+ [RFC8402] Filsfils, C., Ed., Previdi, S., Ed., Ginsberg, L.,
+ Decraene, B., Litkowski, S., and R. Shakir, "Segment
+ Routing Architecture", RFC 8402, DOI 10.17487/RFC8402,
+ July 2018, <https://www.rfc-editor.org/info/rfc8402>.
+
+ [RFC8445] Keranen, A., Holmberg, C., and J. Rosenberg, "Interactive
+ Connectivity Establishment (ICE): A Protocol for Network
+ Address Translator (NAT) Traversal", RFC 8445,
+ DOI 10.17487/RFC8445, July 2018,
+ <https://www.rfc-editor.org/info/rfc8445>.
+
+ [RFC8517] Dolson, D., Ed., Snellman, J., Boucadair, M., Ed., and C.
+ Jacquenet, "An Inventory of Transport-Centric Functions
+ Provided by Middleboxes: An Operator Perspective",
+ RFC 8517, DOI 10.17487/RFC8517, February 2019,
+ <https://www.rfc-editor.org/info/rfc8517>.
+
+ [RFC8557] Finn, N. and P. Thubert, "Deterministic Networking Problem
+ Statement", RFC 8557, DOI 10.17487/RFC8557, May 2019,
+ <https://www.rfc-editor.org/info/rfc8557>.
+
+ [RFC8568] Bernardos, CJ., Rahman, A., Zuniga, JC., Contreras, LM.,
+ Aranda, P., and P. Lynch, "Network Virtualization Research
+ Challenges", RFC 8568, DOI 10.17487/RFC8568, April 2019,
+ <https://www.rfc-editor.org/info/rfc8568>.
+
+ [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases",
+ RFC 8578, DOI 10.17487/RFC8578, May 2019,
+ <https://www.rfc-editor.org/info/rfc8578>.
+
+ [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas,
+ "Deterministic Networking Architecture", RFC 8655,
+ DOI 10.17487/RFC8655, October 2019,
+ <https://www.rfc-editor.org/info/rfc8655>.
+
+ [RFC8754] Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J.,
+ Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header
+ (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020,
+ <https://www.rfc-editor.org/info/rfc8754>.
+
+ [SPB] "IEEE Standard for Local and metropolitan area networks -
+ Bridges and Bridged Networks",
+ DOI 10.1109/IEEESTD.2018.8403927, IEEE 802.1Q-2018, July
+ 2018, <https://ieeexplore.ieee.org/document/8403927>.
+
+ [SRV6-NETWORK]
+ Filsfils, C., Camarillo, P., Leddy, J., Voyer, D.,
+ Matsushima, S., and Z. Li, "SRv6 Network Programming",
+ Work in Progress, Internet-Draft, draft-ietf-spring-srv6-
+ network-programming-16, 27 June 2020,
+ <https://tools.ietf.org/html/draft-ietf-spring-srv6-
+ network-programming-16>.
+
+ [USER-PLANE-PROTOCOL]
+ Homma, S., Miyasaka, T., Matsushima, S., and D. Voyer,
+ "User Plane Protocol and Architectural Analysis on 3GPP 5G
+ System", Work in Progress, Internet-Draft, draft-ietf-dmm-
+ 5g-uplane-analysis-03, 3 November 2019,
+ <https://tools.ietf.org/html/draft-ietf-dmm-5g-uplane-
+ analysis-03>.
+
+Appendix A. Taxonomy of Limited Domains
+
+ This appendix develops a taxonomy for describing limited domains.
+ Several major aspects are considered in this taxonomy:
+
+ * The domain as a whole
+
+ * The individual nodes
+
+ * The domain boundary
+
+ * The domain's topology
+
+ * The domain's technology
+
+ * How the domain connects to the Internet
+
+ * The security, trust, and privacy model
+
+ * Operations
+
+ The following sub-sections analyze each of these aspects.
+
+A.1. Domain as a Whole
+
+ * Why does the domain exist? (e.g., human choice, administrative
+ policy, orchestration requirements, technical requirements such as
+ operational partitioning for scaling reasons)
+
+ * If there are special requirements, are they at Layer 2, Layer 3,
+ or an upper layer?
+
+ * Where does the domain lie on the spectrum between completely
+ managed by humans and completely autonomic?
+
+ * If managed, what style of management applies? (Manual
+ configuration, automated configuration, orchestration?)
+
+ * Is there a policy model? (Intent, configuration policies?)
+
+ * Does the domain provide controlled or paid service or open access?
+
+A.2. Individual Nodes
+
+ * Is a domain member a complete node or only one interface of a
+ node?
+
+ * Are nodes permanent members of a given domain, or are join and
+ leave operations possible?
+
+ * Are nodes physical or virtual devices?
+
+ * Are virtual nodes general purpose or limited to specific
+ functions, applications, or users?
+
+ * Are nodes constrained (by battery, etc.)?
+
+ * Are devices installed "out of the box" or pre-configured?
+
+A.3. Domain Boundary
+
+ * How is the domain boundary identified or defined?
+
+ * Is the domain boundary fixed or dynamic?
+
+ * Are boundary nodes special, or can any node be at the boundary?
+
+A.4. Topology
+
+ * Is the domain a subset of a Layer 2 or 3 connectivity domain?
+
+ * Does the domain overlap other domains? (In other words, is a node
+ allowed to be a member of multiple domains?)
+
+ * Does the domain match physical topology, or does it have a virtual
+ (overlay) topology?
+
+ * Is the domain in a single building, vehicle, or campus? Or is it
+ distributed?
+
+ * If distributed, are the interconnections private or over the
+ Internet?
+
+ * In IP addressing terms, is the domain Link local, Site local, or
+ Global?
+
+ * Does the scope of IP unicast or multicast addresses map to the
+ domain boundary?
+
+A.5. Technology
+
+ * What routing protocol(s) or different forwarding mechanisms (MPLS
+ or other non-IP mechanism) are used?
+
+ * In an overlay domain, what overlay technique is used (L2VPN,
+ L3VPN, etc.)?
+
+ * Are there specific QoS requirements?
+
+ * Link latency - Normal or long latency links?
+
+ * Mobility - Are nodes mobile? Is the whole network mobile?
+
+ * Which specific technologies, such as those in Section 4, are
+ applicable?
+
+A.6. Connection to the Internet
+
+ * Is the Internet connection permanent or intermittent? (Never
+ connected is out of scope.)
+
+ * What traffic is blocked, in and out?
+
+ * What traffic is allowed, in and out?
+
+ * What traffic is transformed, in and out?
+
+ * Is secure and privileged remote access needed?
+
+ * Does the domain allow unprivileged remote sessions?
+
+A.7. Security, Trust, and Privacy Model
+
+ * Must domain members be authorized?
+
+ * Are all nodes in the domain at the same trust level?
+
+ * Is traffic authenticated?
+
+ * Is traffic encrypted?
+
+ * What is hidden from the outside?
+
+A.8. Operations
+
+ * Safety level - Does the domain have a critical (human) safety
+ role?
+
+ * Reliability requirement - Normal or 99.999%?
+
+ * Environment - Hazardous conditions?
+
+ * Installation - Are specialists needed?
+
+ * Service visits - Easy, difficult, or impossible?
+
+ * Software/firmware updates - Possible or impossible?
+
+A.9. Making Use of This Taxonomy
+
+ This taxonomy could be used to design or analyze a specific type of
+ limited domain. For the present document, it is intended only to
+ form a background to the scope of protocols used in limited domains
+ and the mechanisms required to securely define domain membership and
+ properties.
+
+Acknowledgements
+
+ Useful comments were received from Amelia Andersdotter, Edward
+ Birrane, David Black, Ron Bonica, Mohamed Boucadair, Tim Chown,
+ Darren Dukes, Donald Eastlake, Adrian Farrel, Tom Herbert, Ben Kaduk,
+ John Klensin, Mirja Kuehlewind, Warren Kumari, Andy Malis, Michael
+ Richardson, Mark Smith, Rick Taylor, Niels ten Oever, and others.
+
+Contributors
+
+ Sheng Jiang
+ Huawei Technologies
+ Q14, Huawei Campus
+ No. 156 Beiqing Road
+ Hai-Dian District, Beijing
+ 100095
+ China
+
+ Email: jiangsheng@huawei.com
+
+
+Authors' Addresses
+
+ Brian Carpenter
+ The University of Auckland
+ School of Computer Science
+ University of Auckland
+ PB 92019
+ Auckland 1142
+ New Zealand
+
+ Email: brian.e.carpenter@gmail.com
+
+
+ Bing Liu
+ Huawei Technologies
+ Q14, Huawei Campus
+ No. 156 Beiqing Road
+ Hai-Dian District, Beijing
+ 100095
+ China
+
+ Email: leo.liubing@huawei.com